Movatterモバイル変換


[0]ホーム

URL:


US8646059B1 - Wallet application for interacting with a secure element application without a trusted server for authentication - Google Patents

Wallet application for interacting with a secure element application without a trusted server for authentication
Download PDF

Info

Publication number
US8646059B1
US8646059B1US13/244,777US201113244777AUS8646059B1US 8646059 B1US8646059 B1US 8646059B1US 201113244777 AUS201113244777 AUS 201113244777AUS 8646059 B1US8646059 B1US 8646059B1
Authority
US
United States
Prior art keywords
card
applet
application
software application
secure element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US13/244,777
Inventor
Rob von Behren
Jonathan Wall
Alexej Muehlberg
Hauke Meyn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLCfiledCriticalGoogle LLC
Priority to US13/244,777priorityCriticalpatent/US8646059B1/en
Assigned to GOOGLE INC.reassignmentGOOGLE INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: VON BEHREN, ROB, WALL, JONATHAN
Assigned to NXP B.V.reassignmentNXP B.V.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: MEYN, HAUKE, MUEHLBERG, ALEXEJ
Assigned to GOOGLE INC.reassignmentGOOGLE INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: NXP B.V.
Application grantedgrantedCritical
Publication of US8646059B1publicationCriticalpatent/US8646059B1/en
Assigned to GOOGLE LLCreassignmentGOOGLE LLCCHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: GOOGLE INC.
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Communication between a software application midlet of a contactless payment device and a control applet resident within a secure element of the contactless payment device includes selecting, on the software application midlet, a card applet to configure from a registered list of card applets, the list comprising application identifiers (AIDs) of card applets resident in the secure element; transmitting, through a secure channel, to the control applet on the secure element, the selected card applet's AID and an instruction for a selected function to be performed on the selected card applet; invoking, by the control applet, process method function calls of a card runtime environment, wherein the process method function calls are defined by the card issuer or the card runtime environment for performing the selected function on the selected card applet; and rendering the process method function calls, thereby performing the selected function on the selected card applet.

Description

RELATED APPLICATIONS
This application claims priority to U.S. Provisional Patent Application No. 61/424,609, filed Dec. 17, 2010 and entitled “Multiple Contactless Payment Application, Control, And Architecture.” The entire contents of the above-identified priority application are hereby fully incorporated herein by reference.
TECHNICAL FIELD
The invention relates generally to systems, methods, and devices for controlling multiple card software applications using a control software application, the control and card software applications resident in a secure element of a contactless smart card.
BACKGROUND
Contactless payment technology incorporates proximity communications between two devices to authenticate and enable payment for goods and services over the air (OTA) or without physical connection. Near Field Communication (NFC) is an example of a proximity communication option that can enable contactless payment technologies and that is supported by the Global System for Mobile Communications (GSM) Association. RFID is an example of a proximity communication method that can be adapted to enable NFC contactless payment technology. NFC communication ranges generally range from about 3 to about 4 inches. Such short communication distances limit, as well as, enable secure communication between close field proximity enabled devices. Proximity enabled contactless payment also can be implemented on Code Division Multiple Access (CDMA) devices with an embedded secure element within an NFC controller or a Re-usable Identification Module (R-UIM) type card.
In GSM phones, a proximity enabled (for example, NFC) controller with an antenna is incorporated into the device with the secure contactless software applications located on a smart chip. The smart chip can be further incorporated into one of several exemplary phone components, including a standard Subscribed Identity Module (SIM) card, a separate Mobile Secure Digital Card (for example, a secure digital (SD) card with non-volatile memory, such as EEPROM), or an embedded chip for the payment module purposes. An NFC-enabled contactless payment device enables financial transactions, ticketing, secure authentication, and coupons among several services that are available to the device owner.
The NFC contactless payment device can function as a credit card to enable purchases at the point-of-sale (POS) or even via merchant websites, where in the later case a GSM phone can be used to secure bank information from an authenticating server called a trusted service manager (TSM). The bank information is used in a form entry for payments on a merchant website. The TSM hosts and controls all credit card information sent to or withdrawn from a trusted NFC enabled contactless payment device.
Card software applications can be identified by Application Identifiers (AIDs) and are typically stored within the secure element of the mobile device. AIDs may be standardized by the ISO 7816 specification and include between 5 and 16 bytes. The first five bytes collectively of the AID is called a Registered Identifier (RID), which typically identifies the card company—for example, MasterCard®, Discover®, or Visa®. The subsequent bytes may include the PIX or Proprietary application Identifier Extension, which can be used to identify such information as the application type, version, manufacturer, and other information. The secure element can exist within a removable smart chip, SD card, or embedded within a fixed chip on the mobile device. The secure element allows a wallet software application resident on the mobile device and accessible by the mobile device user to interact securely with certain functions within the secure element, while protecting a majority of the information stored within it. Further, a secure communication channel uses encryption methods for communication between the secure element and external device and software. The secure element on the smart card includes crypto processors for calculating crypto algorithms, memory controller units to manage the Read Only Memory (ROM), Ready Access Memory (RAM), and EEPROM flash memory within the smart card.
SUMMARY
In certain exemplary embodiments, a computer-implemented method for controlling a plurality of contactless smart card software applications using a control software application, the control software application and the plurality of contactless smart card software applications resident in a secure element comprises receiving, at the control software application in the secure element, an application identifier (AID) of a selected contactless smart card software application from the plurality of registered contactless smart card software applications and a software code for an instruction to be performed on the selected contactless smart card software application; executing, in the secure element, at one of the control software application, the card runtime environment, or the selected contactless smart card software application, a process method function call associated with the software code, thereby performing the instruction on the selected contactless smart card software application; and updating, at the control software application, a registered list of the plurality of contactless smart card software applications with a software coded tag responsive to the instruction performed.
In certain exemplary embodiments, a computer-implemented method for communication between a software application midlet of a contactless payment device and a control applet resident within a secure element of a smart card, the smart card resident in the contactless payment device comprises selecting, on the software application midlet, at least one of plurality of card applets to configure from a registered list of card applets, wherein the registered list comprises application identifiers (AIDs) of card applets resident in the secure element transmitting, through a secure channel, to the control applet on the secure element, the selected card applet's AID, and a computer-coded instruction for a selected function to be performed on the selected card applet; invoking, by the control applet, process method function calls of a card runtime environment, wherein the process method function calls are defined by the card issuer or the card runtime environment for performing the selected function on the selected card applet; and rendering, by the card runtime environment, the process method function calls, thereby performing the selected function on the selected card applet.
In certain exemplary embodiments, a computer-implemented method to edit a card software application resident in the secure element of a contactless smart card, the card software applications for routing external card reader requests to one of a plurality of alternate card software applications, comprises selecting, in the secure element, using a process method function call of a card runtime environment, one of a plurality of card software applications for personalization, wherein the process method function call uses an application identifier (AID) of the card software application for selection; authenticating, in the secure element, access to the card software application using issuer security domain (ISD) keys stored in the contactless smart card, thereby gaining access to the data contents of the card software application; editing, in the secure element, the card software application by editing at least one of file control information (FCI), a priority status tag, and application discretionary data, wherein the edited FCI comprises the routing information to route the external card reader requests received at the card software application to an alternate AID of the alternate card software application; and installing, in the secure element, the edited card software application, thereby enabling the edited card software application to instantiate a related card sharable interface object (SIO), the SIO comprising at least the alternate AID defined in the edited information for routing the external card reader requests.
In certain exemplary embodiments, a computer-implemented method for managing the lifecycle of a card software application received from a remote trusted service manager (TSM) to a secure element of a contactless smart card comprises receiving, from the remote TSM to a card runtime environment of the secure element, one of a plurality of card software applications in computer-coded form and one of a plurality of computer-coded instructions for performing a function on the received card software application, wherein the card software application comprises account information of one card instrument and an application identifier (AID) code; rendering, in the secure element, the computer-coded instruction, wherein the rendered computer code performs the function on the card software application or invokes a process method function call of the card runtime environment to perform the function on the card software application; registering, in a control software application of the secure element, the card software application using the AID code, wherein the control software application comprises a list of AIDs of previously received and registered card software applications and a card application status tag for each of the listed AIDs; and updating, in the control software application, the card application status tag of the registered card software application, wherein the card application status tag is updated with a computer code related to the function performed.
In certain exemplary embodiments, a computer-implemented method for using sharable interface objects (SIOs) to share data between a control applet and a plurality of card applets across at least one secure firewall in a secure element of a contactless smart card comprises creating, in the secure element, a control SIO owned by the control applet and at least a card SIO owned by one of the plurality of card applets, wherein the card applet and the card SIO are located within a card memory context, the card memory context separated by the secure firewall from a control memory context comprising the control applet and the control SIO; enabling, in the secure element, the control applet to request access to the card SIO across the secure firewall; and invoking, in the secure element, by the control applet a data request or a data transmission process method function call in the card applet for returning card SIO data to the control applet or transmitting new SIO data to the card SIO, wherein the invoking step is initiated when the request for access in the enabling step is granted.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 depicts a block diagram illustrating systems for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments.
FIG. 2 depicts a block diagram illustrating a system for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments.
FIG. 3 depicts a block diagram illustrating a system for event notification using a self-contained control software application according to certain exemplary embodiments.
FIG. 4 depicts a flowchart illustrating a method for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments.
FIG. 5 depicts a flowchart illustrating a method for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments.
FIG. 6 depicts a flowchart illustrating a method for using sharable interface objects (SIOs) to share data between a control applet and multiple card applets across at least one secure firewall in a secure element of a contactless smart card.
FIG. 7 depicts a flowchart illustrating a method for managing the lifecycle of a card software application received from a remote trusted service manager (TSM) to a secure element of a contactless smart card.
FIG. 8 depicts a flowchart illustrating a method to personalize a card software application for routing external card reader requests to one of a plurality of alternate card software applications.
FIG. 9 depicts a flowchart illustrating a method for communication between a software application midlet of a contactless payment device and a control applet resident within a secure element of a smart card.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
Contactless payment devices typically include smart phones; mobile phones; PDAs; mobile computing devices such as netbooks and iPad®s; other electronically enabled key fobs; electronically enabled credit card type cards; and other devices. Some devices can be used for multiple purposes, including financial transactions, coupons, ticketing, secure authentication, and related applications. An NFC enabled chip is implemented, either independently or on existing components, within the contactless payment device, such as the SIM card, U-RIM card, an embedded chip or an external SD card, or any type of smart card.
The secure element can be contained on the contactless payment device, for example, on a smart card capable of hosting secure elements. In certain exemplary embodiments, SIM cards may be capable of hosting a secure element, for example, an NFC SIM Card. The secure element includes components typical of a smart card such as the crypto processors and random generators. A master file in the file structure of the smart card includes additional files that retain authentication keys and application information within the card. The secure element communicates with an NFC controller and the host controller on the contactless payment device. In an exemplary embodiment, the systems and methods described herein can be implemented in Java, using Java Card for the Smart Card applets and J2ME for the midlet applications running on the contactless payment device. The term “card software application” and “card applet” are used interchangeably in this disclosure to refer to a software applications running within the secure element of a smart card. A midlet, for example, a “wallet midlet” or a “Wallet” software application may be a user-interface software application can be developed as a J2ME midlet, where the midlet can be downloaded and installed in the device. Further, the midlet can be made available to a user of the mobile device via a user-interface for making changes with the contents of the midlet functionality.
Card software application providers typically establish Issuer Security Domain (ISD) within the secure element of a smart card, where the ISD utilize keys on the smart card for communication across ISDs or between data objects created by the applets in different ISDs. The ISD may be used to load and delete payment system packages, to instantiate payment applications from external devices, to instantiate a Trusted Service Manager (TSM) Security Domain for download of payment and other card software applications, to lock/unlock card software applications, and to terminate secure element software applications. A proximity payment system environment (PPSE) provides an application directory listing, according to EMVCo (Eurocard-Mastercard-Visa standards) and the specifications of the various card software applications. An updatable directory listing in a file control information (FCI) template is available to a control software application within the secure element. The FCI may be updated with data obtained from the control application and the TSM. The PPSE may be owned by the issuer of the secure element in the mobile device, where the issuer controls the authentication and approval of software applications installed to the secure element. The payment applications may be loaded on the mobile device as a card software application package, where each package, for example, a MasterCard package, typically contains software code for all supported payment applications within MasterCards” offerings, e.g., Mstripe, Mchip, and any other suitable payment application. The payment application creates data objects to control flow of application data. The payment application and the data objects inside the software application package may be protected by a firewall that is described by virtue of the operating system (OS) that functions as the interface among the multiple software application and the control application. In certain examples, the OS is a Java Card operating system (JCOS).
In certain exemplary embodiments, the card software applications and the control software application may be applets within the JCOS structure. The applets, outside of MasterCard's card software applets, each use full-size AIDs for recognition, and may be applets developed in a Java compiler/converter environment. For certain MasterCard payment applications, a “umbrella application,” referred to herein as the generic software application, for all payment type card software applications may be used, where the first 7 bytes in the AID of each card software application is the same. An instance of the MasterCard payment application may be selected for activation and can be masked using the 7 byte AID, which hides the full-size AIDs from the terminal. The masked AID then redirects the terminal request for an application to the activated instance of the payment application underlying the masked 7 byte AID.
In certain exemplary embodiments, a user preference setting is exposed and controlled by the control software application. Direct access to an instance of the card software application occurs only if the full-size AID is listed. An unselected user preference for an instance of a card application to be listed within the PPSE application directory indicates that the selection of a payment application is rejected. When a full-sized AID is selected, the directory software application then routes payment transaction commands according to user selected settings, directly to the selected instance. Instantiation and creation of a card software instance during post-issuance and routing of the card software application object, as well as personalization commands for the card software application are all functions performed by the control software application, with support from the card software applications being installed.
Java Specification Requests (JSR) may be used in J2ME (Java Micro edition) to standardize various communication channels between the various components in the contactless payment device. In certain exemplary embodiments, the JSR177 specification is used to allow communication between a graphical user interface midlet application on the device operating system and an applet in the secure element of the smart card using application protocol data unit (APDU). The JSR257 specifications allows the midlet application on the device to access the radio interface via the ISA 14443 standard, and also can provide a low level interface to the secure element. JSR177 establishes security and trust for application programming interfaces (API), where the API supports communication between the device and the smart card. A card execution environment, for e.g., in the case of a Java Card, a Java Card Runtime Environment (JCRE) and the Java Card API may be stored in the ROM of the smart card. Payment type card software applications and the control software application can be developed as API Java packages and may be loaded into the volatile flash memory section of the smart card. The card execution environment includes an instruction set for compiling software applications as well as application programming interface (API) function calls. The card execution environment may be implemented via a virtual machine that compiles the overlying software applications to the native machine language of the underlying physical hardware. Java bytecode and .NET bytecode are examples of the instruction set, while Java class libraries and .NET class libraries are examples of the API function calls that can be implemented via a card virtual machine, thereby forming a card execution environment.
In certain exemplary embodiments, security of data objects from each application in the smart card prevents rogue applications and coding errors from stealing data. This security is implemented via applet firewalls in the Java Card Platform. Spaces can be allocated to data objects for the card execution environment (e.g., JCRE for Java Cards), and for each applet and applet group. These spaces are called “contexts.” A “JCRE context” is an allocated space for the java card runtime environment in the smart card temporary memory. Group contexts may be allocated to applets within an application, where an applet performs a sub-routine within an application on the smart card. Each context is separated by an in-built firewall that prevents data objects from being shared. While this implementation safeguards the data objects from other applications, it prevents multiple instances of an application type from sharing information. An application for a single card type, with multiple instances (for different financial instruments) can be developed, where the multiple instances are separate applets, and therefore share the same data objects. When one applet calls another applet within the application group, the control for data objects is transferred to the second applet. Routing of the application to an applet allows an instance of the application to be selected.
In certain exemplary embodiments, the data objects created and owned by each card software application can be shared between multiple applications using shareable interface objects (SIOs). This implementation allows the control software application to control selected data objects from other software applications within the smart card, without including security and firewall procedures. This implementation allows the controller application to review the status of other card software application type applets via review of the data objects generated by each applet. Each applet in the secure element of the smart card is identified by a unique AID. In certain exemplary embodiments, the control software application and each of the card software applications are included within independent applets, each with its own fixed AID. When an applet is created, the JCRE is notified and the applet is registered using the assigned AID of the applet. Thereafter, the JCRE encapsulates the AID bytes into an AID object, which is an object defined by the JCRE system. An applet that creates an SIO for the purpose of sharing may be referred to as the server applet, with the AID object being used by other applets, the other applets being referred to as client applets that use the server AID for identification purposes. The SIO is shareable between other applets through the firewall by the server-client relationship established within the JCRE system. However, the applet that requests the shareable object gains control of the object until it has finished its processes; thereafter, the SIO may be available to the other applets, provided the other applets have the required pre-defined permissions.
In certain exemplary embodiments, the server-client SIO definition within the JCRE allows a “wallet” software application to track all instances of the card software applications in the secure element via the control software application in the smart card. Events may be referred to functions performed on each of the card software applications. Events having occurred and the state of each card software application instance is logged using the information from the respective SIO for each of the applets. In certain exemplary embodiments, the control software application contains a user preferred list (UPL) of the preferred payment applications. In certain exemplary embodiments, the preferred card software applications are presented in the list, while other non-preferential card software applications are not presented in the list. The wallet application contains a list of all payment applications registered with the JCRE. Through the SIO, using the secure element JSRs, the wallet application can be used by the contactless payment device user to select certain card software applications as preferred applications via a user-interface, thereby creating an order based on the type of card software application. The various functions performed via a user-interface instruction may include instructions to enable or disable certain card software applications and to delete a card software application instance. In certain exemplary embodiments, all of these exemplary JSR functions can be performed without any trusted service manager authentication.
The proximity payment service environment (PPSE) is a directory software application that is selected by the terminal reader when the contactless payment device is presented to the reader. Following the above functions that personalize the choice of the payment type card software application, a wallet software application can be used to send management commands, which are used to update the PPSE with the available and active card software applications in the order selected by the user.
System Architecture
FIG. 1 depicts a blockdiagram illustrating systems100 for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments. An external trusted service manager (TSM)108 controlled by a near field communications (NFC)service provider104 hosts and transmits card software applications for installation within thesecure element152 of a contactless smart card inmobile device140. TheNFC service provider104 provides a secure key encrypted software card application for decryption and installation in thesecure element152. The TSM108 includes a trusted service agent, which may be an automated software distribution entity within the TSM. In certain exemplary embodiments, the TSM may be accessible to themobile device140 via theInternet132 directly, without the requirement of amobile services provider136 for the purpose of downloading trusted card software applications to the mobile device. Themobile services provider136 provides card software applications in one of many mobile services protocol, such as 3G and 4G. In certain exemplary embodiments, the TSM108 may exist as a part of themobile services provider136.
In certain exemplary embodiments,external application providers112 provide card software applications to the TSM108 for deployment to themobile device140. In an alternative embodiment, each of theexternal application providers112, may include a TSM for providing trusted card software applications directly to the mobile device via theInternet132 or themobile service provider136. Exemplaryexternal application providers112 includecredit card companies116 for providing credit card type payment card software applications (e.g., Java credit/debit/PayWave/PayPass type applets),ticketing companies120 for providing tickets to events, travel, and other related functions,coupon companies124 for providing coupons that are downloaded and scan-able at a point-of-sale (POS) using the contactless smart card, RFID tags, barcodes,QR 2 dimensional bar codes, and other similar optical coding methods, anauthentication company128 for providing authentication data that may be used to lock/unlock physical appliances or for virtual functions on computer software, and a protectedinformation provider121, such as a bank, merchant, or other financial service provider, for providing confidential or otherwise protected information (for example, account information), which may be used to instantiate a particular card.
In certain exemplary embodiments, anapplication host OS144 on themobile device140 provides the user of the mobile device with the capability to manage multiple card software applications and its instances160-164 using awallet software application148, where the wallet software application does not need TSM108 permission to perform certain functions on each of the card software applications and its instances160-164. The management of the card software applications may be performed via acontrol software application156, which communicates with thewallet software application148 using APDUs, transmitted and received, through a secure and encrypted communication channel. The control software application may freely communicate with the multiple card software applications and its instances160-164 because each of the card and control software applications are resident within the samesecure element152. Alternatively, multiple secure elements providing a secure communication channels will provide the same functionality as disclosed herein. The user may engage thecontrol software application156 using commands to activate, deactivate, prioritize, delete, and install card software applications within the secure element.
When the card software applications have been activated and prioritized, theNFC controller168 is notified of the state of readiness of themobile device140 for an NFC transaction. The NFC controller polls, through theantenna172, a radio signal, or listens for radio signals from areader terminal device176. On establishing a channel between thedevices172 and176, the reader requests to see the list of available card software applications within thesecure element156. A directory is first displayed, after which, based on the set priority or the type of reader, an application160-164 is chosen and initiated for the transaction.
FIG. 2 depicts a block diagram illustrating asystem100 for controlling multiple secure element basedcard software applications240,252, and260 using a secure element basedcontrol software application156 according to certain exemplary embodiments. The selections made on thewallet software application148 via a user-interface are transmitted to thecontrol software application156 within thesecure element152 via a secure communication channel, and the changes are implemented into the payment typecard software applications160 and itsinstances164. In certain exemplary embodiments, for a payment typecard software application160, the user may choose from different card types (for example, PayPass, Paywave, debit cards, or other types) from different credit card companies (for example, MasterCard, Visa, Discover, or other companies), as well as different bank instances (for example, Bank A, B, C, and D) for each card type on the user-interface. Thewallet software application148 manages theControl Applet156, which is the representative of the user on thesecure element152. Accordingly, in certain exemplary embodiments, a user can perform such secure element functions as, enable or disable the contactless card software applications, configure thePPSE212, set the priority of payment applications, set an “always on” contactless card software application, and/or set a default contactless card software application to be presented to the terminal.
In certain exemplary embodiments, the sharable interface objects (SIOs)236A-X are used to communicated with the software applications andinstances212,224,240-272 within thesecure element204 of the contactless smart card. The SIOs are owned by the respective software applications and are created at the time of creation of the software applications. To share data across the software applications, the owner of the SIO is designated to be in a server mode control of the SIO, while the recipients function as the clients to the SIO. Data created by the software applications may be stored in the SIO in a recognizable format established by existing standards such as the GP and SECM standards. In certain exemplary embodiments, the AIDs of each of the applications are stored in a list format232 in thecontrol software application224. The control software application includes a list232 of the activate/inactive/non-activatable card software application AIDs in certain format. In certain exemplary embodiments, the list232 typically includes appropriate short and full sized AIDs depending on the type of card software application. Some legacy readers with the requirement to read full sized AID require the corresponding card software application to have their full sized AID listed (e.g.,232).
In certain exemplary embodiments, the active AIDs from thecontrol software application224 typically updates thedirectory software application212. Alternatively, the control software application may server as the directory software application with special privileges to contactless requests from a reader, and different privileges to contact requests from the user internally via the user-interface. Eachcard software application240,252,260, and268 may include instances of their respective applications, such as248 and276. The instances may share the same SIO, where the active instance takes ownership of the SIOs236. The SIO store the application data that defines the issuer of the card software application, the user data within the card issuer application, and possibly a log of transactions tied to the specific card software application and/or its instances. When acard software application240,252,260, and268 is enabled, the SIO is active and is accessed by the client modecontrol software application224. The control software application maintains aUPL228 of a list232 of card software applications and their status from each card software application server SIOs236.
In certain exemplary embodiments, areader280 reads thesecure element204 for the first time, thePPSE212 is read by thereader280. The list of availablecard software applications216 are displayed by the AIDs220 to the reader. The reader then chooses or is defaulted to one of the multiple available card software applications. Accordingly, if thereader280 choosess_AID2220B, then the corresponding full AID is retrieved from the control software application. The selected full AID will bef_AID21232F. The correspondingcard software application268 is triggered and the application itself, or itsinstance272, in this case, is activated to the NFC controller for radio transmission of data to the reader.
In certain exemplary embodiments, the user may configure the list in thecontrol software application224, using the wallet application on the user-interface, where the wallet application sends APDU instructions to thecontrol software application224 to perform a function on the selected card software application or itsinstances240,252,260, and268, or theUPL228 on theapplication224.
In certain exemplary embodiments, in the case that the user chooses not to enter a PIN prior to payment, the settings for such processes can be controlled by the user. In case the mobile is powered off and running in virtual card emulation mode where the secure element is powered by the field, the control software application may not access the control functions defined within the device. Implicit access control is provided by the owner of the contactless payment device.
Additionally, in certain exemplary embodiments, only the contact interface performs management commands, and the control software application applet does not have any influence on functionality or security of card software applets. The management commands may be primarily capable of enabling or disabling the selection of the payment application and updating the PPSE file control information (FCI)208 for the application lists216. Thecontrol software application224 is assigned a specific fixed AID and can be called by the external wallet application for selection. Internal to the smart card, the control software application AID may be used by acard software application240,252,260, and268, in the server mode (for sharing of data object SIOs as previously discussed), and may have AIDs designated by the operating system of the JCRE (at installation of the card software application) in the absence of an assigned AID. The server mode card or control software application can then verify the AID. The control software application may be the client software application for SIO purposes in event notification functions, for example, instantiation of new contactless payment applications, deletion of instantiation applications, and transaction events, like payments.
The user preference list (UPL)228 stored within thecontrol software application224 as previously discussed may be implemented using registry tags. Information contained within the UPL is illustrated in Table 1 according to certain exemplary embodiments. The items marked “User Defined—UD” are accessible through the secure firewall using the SIOs. The other items are not accessible to the user or other applets, thereby reducing any risk of including data security. In certain exemplary embodiments, the use of a PPSEdirectory software application212 for card software application lists may be merged with the function of theUPL224 of thecontrol software application224, thereby creating a single list which can be accessed by the user-interface via the secure communication channel In this embodiment, changes made by the user to the list on the user-interface can be used to update the UPL on the control software application which is then made available to the reader when the reader terminal requests a list of active applications on the contactless mobile device.
TABLE 1
Application related data: 61
AID: 4F(ES)A000000003101001A000000004001010A0000000043060
Application Short File(ID)123
ID: 94
Priority: 81(UD)213
Lifecycle: 9F70(ES)SELECTABLESELECTABLESELECTABLE
ACTIVENOT_ACTIVEACTIVE
Update Counter: 80(ID)261
Discretionary Data: A6
MC indicator: AA(ID)falsetruetrue
Payment system: AB(ID)VISAMCCREDITMCDEBIT
Issuer: AC(ES)BOACITIWF
‘AlwaysOn’: AD(UD)truefalsefase
Event Logging list: A7
Global Event Sequence Counter: A9 (ES)
16
Event: AF
Short File ID: 94 (ID)Sequence Counter: A8 (ID)Event ID: AE (ES)
2121
1133
1146
3152
Codes:
Externally supplied—ES
Internally derived—ID
User defined—UD
In certain exemplary embodiments, external commands formatted to the control software applet may be represented by Global Platform (GP) 2.2 standard. The GP 2.2 standard defines Java Card API standards for applets within the secure element. This will allow an easier transition for the next Java Card Open Platform (JCOP) platform for supporting updates and amendments. As shown in Table 1 above, the event logging list can be used to trace the payment events, installation of bank instances, and deletion thereof. The Global Platform type control software application can include a standard format based on the Secure Element Contactless Management or SECM in the Europay, MasterCard, and Visa—the EMV standard, or contactless registry service (CRS), which is GP standard terminology. Further, the card software applet in certain exemplary embodiments is defined to work with both, the GP standard and a SECM standard, where each standard supports a type of on-card software application management. The control software application can implement an APDU instruction set to perform the following exemplary functions per the request of a wallet application: get non-secure information on registered contactless card and external software applications (via the AID of the card software application) and their respective contactless registry information (GP standard reference for the UPL); activate/deactivate contactless card software applications; and respond with a list of conflicting application AIDs, where the APDU also establishes the order of applications in the UPL registry of the control software application by receiving a list of application AIDs. Additionally, some exemplary modules have AIDs that are reserved by the GP standard for the purpose of installing the control software application, including an executable load file AID, an executable module AID, and an application AID. The control software application may typically process the APDU commands, therefore providing the user with expected management capabilities via the user-interface.
The exemplary parameters in the UPL in Table 1 may be accessed through a GET STATUS and SET STATUS command issued by the control software application. The application AID tag “4F” may be a tag within the contactless registry UPL. Partial AID matching is supported when this tag is used as a search criterion in the GET STATUS command. If a length for the AID is not specified in the GET STATUS command, then a complete contactless registry UPL may be returned. In an exemplary embodiment, the GP control software application can be resident outside the security domain because the definition of the GET STATUS and SET STATUS commands require access to only the non-secure status information and not the actual secure data. Application short file ID defines the local namespace of the contactless registry UPL. This item is used by the event logging list to map an application identifier to the software application that produced the event. Priority indicator defines the order in which the payment applications are represented in the PPSE. An entry of “0” means that the respective contactless card software application is not accessible over the contactless interface, for example, the card software application may be disabled by the user or locked by the issuer.
In certain exemplary embodiments, the Application Lifecycle State tag “9F70” provides the application lifecycle state on the first byte as defined in GP2.2 standards. The Contactless Activation State may be encoded on the second byte as defined in GP2.2 standards. The software application discretionary data may be accessible to the wallet application through the control software application, for proprietary usage. In certain exemplary embodiments, if the card software application belongs to MasterCard, a MasterCard indicator may be set in the corresponding cell of Table 1. The tag for the control software application can execute logic on the short-size AID limitation on legacy readers. Value coding may be on one of the tag byte as follows: “A5” indicates not in MasterCard payment system, i.e., false, while “5A” indicates a MasterCard payment system instance, i.e., true.
In certain exemplary embodiments, the system indicator tag codes in Table 1 are provided in ASCII used by the payment system, for example, “VISA.” The issuing bank tags can be coded in ACII, for example, “CITI.” The mechanism to determine the issuer can be done by either using information provided by the trusted service agent (TSA), which is a trusted service manager (TSM) owned off-card software application on the payment device (or wallet application), or information coded in the payment application's PIX. In certain exemplary embodiments, the “Always On” feature from the payment card software application describes a state where a contactless card software application that is activated on a payment device is accessible to a contactless terminal as long as the mobile device is capable of communicating over the antenna interface, even when the payment device is not “switched on”. A card software application in the “Always On” state can be equated to a regular contactless card in that the only action required from the mobile device user to initiate a contactless transaction is the act of presenting the contactless payment device to the contactless terminal. Conversely, a contactless payment card software application that is not in an “Always On” state would need the consumer to take a conscious action on their payment device to make the application accessible prior to the act of presenting the mobile payment device to the contactless terminal. As an example, setting byte data to “A5” in Table 1 indicates not an “always on” or false state, while “5A” indicates “Always On” or true state.
The Event logging list in Table 1 includes recorded transaction events. The on-card software application resident in the secure element initiates an event, for example, a PayPass event, where the last transaction command could signal a payment attempt. In order to support the GP standard, the CRS version of the control software application will reference the contactless registry UPL using the short file application ID and record the global sequence counter value at the time of event. An event ID (identifier) signals what type of event occurred. Events may be triggered by the payment type card software applications that are activated on the mobile payment device. The following events are exemplary events that may be registered in this list, where the byte code is coded in the event ID, for example, application INSTALL—tag, 01, application DELETE—tag 02, application SELECT: 03, application BLOCKED: 04, application UNBLOCKED: 05, PIN VERIFIED: 06, PIN FAILED: 07, and Payment transaction: 08.
Event sequence counter, short file ID, or Event ID are chronologically numbered in the event logging list. The value of the global event sequence counter is recorded, together with the short file ID. Then, events can be identified in order. Event ID specifies what type of event occurred. The Global Event Sequence Counter is a short number, recording the number of all events that occurred. An unsigned overflow is allowed to occur (at a range of 65000 to 0). The trusted service agent (TSA) are software applications within a trusted server manager (TSM) that manage deployment of card software applications to the secure element of contactless smart cards. The trusted service agent (TSA) also manages updates to the deployed card software applications in a remote contactless payment device's secure element based on requests from the user of the contactless payment device or an issuer of the TSM card software application. The UPL in the control software application is self-contained using notification mechanisms through the SIOs.
In certain exemplary embodiments, the control software application SIO uses Shared Notify Service Interface, which is a shareable (tagging) interface for notification of SIO data. The following methods are accessible by card software applications in the format of “notify(AID aid, short event)”: application INSTALL: 01; application DELETE: 02; application SELECT: 03; application BLOCKED: 04; application UNBLOCKED: 05; PIN VERIFIED: 06; PIN FAILED: 07; and Payment Transaction: 08.
In certain exemplary embodiments, the control software application may implement the Shared Notify Service Interface by itself. When a notify message is triggered, the control software application runs instruction based logic to update the UPL.FIG. 3 depicts a block diagram illustrating a system for event notification using a self-contained control software application according to certain exemplary embodiments. A trustedservice agent304 sends a one of a number of available requests312, along with the AID and a card software application for installation, deletion, or another function, each to be performed within thesecure element308 of a contactless smart card. In certain exemplary embodiments, the installapplication312B request is received via theJCRE316. TheJCRE316 includes API classes andmethods320 and324 to perform the functions requested by theTSA304. For an exemplary install function, an installinstruction348A is sent to the card software application represented by the short AID of the full AID reference used in the TSA request (312B). In certain exemplary embodiments, the card software application forcard type C360B is chosen to receive the API function call from theJCRE316 because the full AID the received request includes the short AID of the selectedcard type C360B. This indicates that the received software application may actually be an institutional instance of an existing card software application. Thecard software application360B initiates the installation of the instance of the card software application as received within the secure element.
In certain exemplary embodiments, upon installation, the card software application notifies thecontrol software application328 of the newly installed instance of the card software application. The card software application may simply trigger amethod call352B with the card software Java applet using the full AID of the instance, along with an event ID to indicate the function352 performed on the instance (e.g., install, delete, etc.). Thecontrol software application328 adds336H the AID of the payment card software application or a card software application instance to theUPL332. In certain exemplary embodiments, the card software application applets360 access the control software application SIOs344 from a constructor class instance of thecard software application328, thereby triggering the instantiation event for notification ofdeletion352A,installation352B,transaction352X, and other related functions352.
In certain exemplary embodiments, to ensure the constructor instance is not throwing an exception during instantiation (for example, if an algorithm including a function requested by the TSA is not supported or the contactless smart card memory is not sufficient), event notification352 can be done after JCRE registration of the instance (register method)320. In certain exemplary embodiments, for MasterCard owned card software application instances e.g.,instance364, the event for notification352 can be triggered by a generic software application upon creation of the instance, where the generic software application masks the full AID to support short and long AID implementations from the terminal reader's that reads only the full or only a short sized AID. For the DELETE function348, thesecure element308 operating system OS receives aJCRE316 function348 which marks the card software application instance or the whole card software application package for deletion. If open references are not found, the deleted applet is removed fromregistry328 and the memory is freed by the OS. TheJCRE316 provides an AppletEvent method “uninstall,” which is called, if implemented, before a card software applet360 is deleted. The “uninstall” method allows the instance to execute maintenance before removal. As an example, references can be set to null, or in this case, notification352 is sent to thecontrol software application328 that theinstance364 has been deleted. The control software application then removes the deleted payment card software application entry (AID)336G from theUPL332. As such, this removal allows synchronization of theUPL332 against theactual JCRE registry324D supporting the notification event mechanism.
A card software applet can trigger an event to thecontrol software application328 through itsSIO344 using an applet defined uninstall method using the JCRE APIs. For MasterCard owned banking instances, for example, the generic software application applet signals the removal of an instance (by setting it to “null” and clearing all data). During SELECT, the payment card software application360 notifies thecontrol software application328 that the paymentcard software application360A-X is selected. Thecontrol software application328 updates theevent logging list340 accordingly and asequence counter356 notes the notification. The AID can be provided as a parameter within thenotification352A-X to thecontrol software application328 for performing the selection. However, for a MasterCard bank instance, the full-size AID can be included in the notification as the server mode SIO may not determine the bank instance masked by the payment card software application's short AID. In certain exemplary embodiments, this solution applies for legacy readers, where legacy readers are unable to read the short-sized AID. For non-MasterCard payment applications, the AID can be retrieved using JCSystem.getPreviousContextAID method in the SIO java card functions of theJCRE316. After finding the AID of the client of the SIO, thecontrol software application328 searches through all AIDs inUPL332 and maps it to the corresponding short File ID (SFID).
In certain exemplary embodiments, for the UNBLOCKED/BLOCKED functions from theJCRE316, based on requests from theTSA304 may be rendered on a selected AID of the card software application360 for blocking. The instruction for blocking or unblocking may be defined by thecontrol software application328 using APIs from the JCRE that causes a selected card software application360 to trigger an event to thecontrol software application328. Simultaneously, another instruction is executed, for example, to remove the card software application instance from PPSE or theJCRE registry324D, and to clear “AlwaysOn” for the blocking event. For the PIN VERIFIED/PIN FAILED functions, the paymentcard software application360A-X informs thecontrol software application328 about the status of the card software application post rendering of the function. TheTSA304 will interface directly with the payment card software application360 for PIN processing. The wallet application on the mobile device OS also has a method to gather a PIN processing state using theUPLs332 event list and the APDU disclosed previously. In case of payment transaction commands, a payment card software application360 can trigger a function to add a transaction event352 as a notification to theevent logging list340 of thecontrol software application328. The timing of the event notification is defined by the card software application, for example, it can be during the selection of the card software application or after the last command processed on the secure element.
System Process
In certain exemplary embodiments, external commands available for the CRS (GP control software application) include a SELECT command. The SELECT command initiates the CRS to return file control information (FCI) signaling the version number and global event sequence counter. Here, the data may include the CRS AID, which can be the AID for the control software application. The response to the command is tag “6F”: FCI template, tag “84”: CRS AID, tag “A5”: FCI Proprietary Template, tag “9F08”: version number (2 bytes), Value “01” “00,” tag “A9”: Global Event Sequence Counter (big endian). To obtain a CRS registry entry, the GET STATUS command is used. This command retrieves the CRS registered contactless applications, the Lifecycle status, and other information according to the given match/search criteria. Data on non-contactless payment applications may not be available through this command (for example, the CRS control software application itself cannot be mined). Authentication is not required to process this command. Data secured is of the format tag “4F,” full-size AID, partial AID, where “4F” “00” means complete registry. An alternative response could be “registry entry”: “none” if not found; if found, the data is encapsulated in the application related data tag “61” for the certain exemplary conditions including, one applet in case of full-size matching AID, one or more applets in case of partial AID match, and a complete registry if no AID specified.
The SET STATUS command may be used to modify the “Availability State” of the CRS registered contactless software card application(s), and the priority assigned to the active application list in the PPSE or the FCI. In addition, the SET STATUS command can be used to globally switch on/off the contactless interface. The SET STATUS command may be limited in terms of modification options offered to non-contactless application data. Further, authentication may not be required to process this command. The data targeted by the SET STATUS command for one or more application AIDs includes information corresponding to contactless interface activation/deactivation status, application lifecycle state, and application discretionary data. The response to the command may either be an “OK,” data/signal when the user preference is rendered, a “warning” data/signal when conflict resolution is successful where user preference is executed partially, and/or an “error” data/signal when conflict resolution fails, where the previous user preference is still active. This process is illustrated inFIG. 5.
In certain exemplary embodiments, for the GP specification of a payment environment, an internal method call in the PPSE towards the control software application applet typically modifies the FCI. By way of an example, a function, “setFci(byte[ ] aidList):void”, may be defined that lists parameter AID including tag length value (TLV) of the coded AIDs, where the coding may be defined according to the EMVCo contactless specification. A clearFci( ): void function may be defined for clearing the FCI content in the PPSE. However, for EMV compliant terminals, the PPSE may not show any payment applications on the secure element for this method, and a direct read is performed to an active card software application as illustrated inFIG. 3.
In certain exemplary embodiments, the JCRE or the control software application may include internal method calls toward each of the payment card software applications. When the payment card software application does not belong to the MasterCard payment system, the AID parameter and its length may not be of relevance for the reader and internal card software application selection. The selection of the card software application may be enabled or disabled accordingly. In case the card software application belongs to the MasterCard payment system, a generic software application locates the institution (e.g., bank, stores, etc.) instance of a card software application according to the AID parameter. In certain exemplary embodiments, the internal method calls applicable may include such custom functions as, a enableSelection(byte[ ] aid): Boolean, for enabling selection of a payment card software application and returning values as true if enabled or false for a general error (for example, the applet is locked). Another exemplary method call includes the disableSelection(byte[ ] aid): void, which disables selection of a payment type card software application.
Further,FIG. 3 also illustrates a standard payment transaction and related event notification using a payment type card software application, where the payment is processed as defined by EMV standards to support existingreaders376 according to certain exemplary embodiments. Payment type card software applications allow a selection and a transaction over a contactless radio interface. In certain exemplary embodiments, using the terminal376 selects either the PPSE or an activatedcard software application360X and receives the FCI from the PPSE listing the available card types by the AID. In certain exemplary embodiments, theterminal reader376 may make a default request for a particular card software application. For MasterCard payment applications, in view of the previously described legacy ready issues, the reader terminal matches short-sized AIDs of the MasterCard payment application. The terminal then selects the matching short-sized AID of the MasterCard payment application. Upon receipt of a SELECT command, the MasterCard applet checks if an active bank instance exists, and if yes, then the payment card software application sets routing information for commands to the active bank instance. The SELECT command is forwarded to the active bank instance. If the response is modified, the application exchanges FCI with the short-sized AID of the MasterCard payment application. This response is communicated back to the terminal. If an active bank instance does not exist, the same error status is returned to the terminal as for non-existent AIDs on the card. Thereafter, all proceeding commands and responses are routed to the selected bank instance.
For non-MasterCard payment applications, the terminal will match full-size AIDs, and will select a full-size AID of the payment application. Upon receipt of a SELECT command, the payment card software application checks if selection is enabled, and, if yes, initiates processing functions as previously discussed. If the selection is disabled, the same error status is communicated to the terminal as is returned for non-existent AIDs on the smart card. For access purposes, in an exemplary embodiment, only the wallet application can access the control software application externally. An access control is not needed for any other application, and indirect access control is limited and exercised by the use of a contact interface, ownership of the contactless payment device, or security features on the device, such as hiding API access to the secure element. Additional security can include adding PIN verification, among other methods. The control software application does not exhibit the UPL or any other information internally. The control software application uses UPL for the decision process, for example, what payments applications should be updated with active/inactive (activated/deactivated) information and what content should PPSE exhibit to the terminal. To perform this function, the application follows the SIO method by acting as the client and accessing information via the SIO PPSE and payment applications.
Compared to the PPSE in a card form factor, the PPSE in a mobile contactless payment device may not be static. The user preference for a specific payment instrument may be applied by activating and deactivating certain payment apps and also, by exhibiting directory of available card software applications to the terminal. Such a directory may be contained in the FCI of the device PPSE. The PPSE functionality may conform to the definitions of the EMV specifications in order to support legacy readers. For mobile contactless payment devices, the PPSE can be updatable. In certain exemplary embodiments, the update process is handled internally through the control software application. The EMV approach makes the update process configurable directly using the user-interface, i.e., the wallet application, on the mobile device. The EMV contactless mobile specification commands “PUT TEMPLATE” and “GET TEMPLATE” can be mapped to SIO methods for the control software application. The FCI in the PPSE can be a list similar to the UPL list; however, some differences may be related to the strict structure as defined by EMV, where full-size AIDs of MasterCard payment applications' bank instances may not be listed. Instead, only the first 7 bytes are listed. In this manner, a subset of the UPL is listed (in case the UPL includes strict EMV structure with extensions such as “AlwaysOn.”). This listing is illustrated inFIG. 2, where thedirectory software application212 includes a list of short and full sized AIDs220. When theapplication212 is presented to thereader device280, the reader device may select an application according to the pre-set reader designations or the availability of the activecard software applications240.
In certain exemplary embodiments, thePPSE FCI212 is accessed for reading through the contactless interface, and is not access controlled to support legacy type readers with EMV specifications. Here, all the data in the PPSE may not be distributed to merchants' reader by default, but is available to the user for selection via the user-interface. The user may choose to use the access functionality for specific payments on short distance contactless communication with a specific merchant terminal. The wallet application user-interface may implement configuration options for the data included in the PPSE, where the data can be further distributed, for example, using loyalty programs or pinpointed advertising.
Application Lifecycle Management of on-card application lifecycles are defined in GlobalPlatform (GP) specifications, specifically for contactless in GP 2.2. In certain exemplary embodiments, the existing card lifecycles may be coded on the first byte, while the second byte defines a contactless activation state. The additional three contactless activation states are “ACTIVATED,” “DEACTIVATED,” and “NON_ACTIVABLE.” The contactless activation state byte may be encoded independently of the application lifecycle state byte. The value of the contactless activation state byte can be retrieved independently using the GET STATUS command from the CRS control software application. A card software application currently in the “ACTIVATED” state is able to communicate through the contactless interface. Conversely, an application currently in the “DEACTIVATED” state may not able to communicate through the contactless interface. An application in the “NON_ACTIVATABLE” state is implicitly DEACTIVATED due to some internal reason known by the application or its provider (for example, a possible attempt of fraudulent use), and cannot be ACTIVATED by the control software application. Any attempt to activate an application that is currently in the NON_ACTIVATABLE state typically fails.
In certain exemplary embodiments, transitions between the three contactless activation states abide by certain rules maintained by the control software application. In an exemplary rule, an application may always able to transition itself into the “DEACTIVATED” state automatically. In another exemplary rule, an application cannot transition itself into the “ACTIVATED” state without user permission and in yet another rule, an application may transition itself into the “NON_ACTIVATABLE” state at any time, thereby indicating to the OPEN that it is both deactivated, and not in a suitable internal state to become ACTIVATED on the contactless interface. Further, an application may be able to transition itself from the NON_ACTIVATABLE state to the DEACTIVATED state, thereby indicating to the OPEN that it is in a suitable state to become ACTIVATED again. In addition, certain rules may also be applied to the lifecycle process for communication with the contactless interface. In one exemplary rule, an application may not communicate through the contactless interface if it is not in a selectable state (in particular, when the application is in the LOCKED state). Further, when an Application is unlocked, the contactless activation state remains in the same state as it was prior to being in the LOCKED state, which means that the wallet application should be cautious while setting the contactless activation state to DEACTIVATED.
In certain exemplary embodiments, personalization of certain card software applications may not be compliant to EMV and other payment system standard specifications. This may be a result of the application objects that are created, and may not be directly available for use via a full-size AID compared to a payment card software application on a card (form factor). MasterCard in legacy reader devices may not support short-sized or partial AIDs. A personalization flow modification and personalized commands can be considered in this case. In certain exemplary embodiments, support for legacy readers can be implemented on a personalized PPSE. The card software applications that access the issuer secure domain (ISD) of the contactless smart card can be accessed for customized GP API creation using the issuer secure domain (ISD) keys. The personalization method, in certain exemplary embodiments, is performed by injecting personalization keys encrypted with an ISD data encryption key (DEK) to the ISD to access existing card software applications. A payment card software application may be selected and authenticated using the personalization keys for customization purposes.
In certain exemplary embodiments, the personalization of the selected payment card software application may be implemented by changing theFCI tag208 and other accessible data upon gaining ISD access. Further, the personalization phase for a payment card software application can then be disabled to complete functionality of the personalized software application within the secure element. An INSTALL function for install and selection of the application is applied to the personalized card software application. The INSTALL function is the GP command handled by a payment card software application to instantiate a bank object, which, in this case, is a full-size AID included in the INSTALL command. A new command may be created to describe this same function for the purposes of personalization of the card software applications. The payment card software application notifies, via the SIO, internally, to the control software application of successful instantiation. In another exemplary embodiment, a second new command may be instituted using the available APIs for selection, by file, of the personalized card software application's data object with full-size AID. The selected data object can be routed by the secure element OS to the payment application. The personalization script for a selected card software application may be created according to the payment system specification to be supported by the software application. A final personalization command may be applied to disable (or terminate) the bank object personalization phase. While the payment card software application may not be personalized afterwards, it is an option to allow bank object instantiation and personalization during post-issuance.
In certain exemplary embodiments, deletion of a card software application involves sending the DELETE command directly to the card software application. The data field of the command contains the AID of the instance of the card software application to be deleted. In certain exemplary embodiments, only a full-size AID is accepted to identify the exact instance for deletion. In certain exemplary embodiments, to delete a card software application instance, a card software application is selected and authenticated using ISD keys, where the card software application accesses the ISD in the secure element using GP APIs defined by the JCRE. The GP's DELETE [AID] command may be executed, and the card software application clears all instance specific data, where the data is not shared. All the session data is cleared to 0s. The secret keys are overwritten with 0s and the transient keys, transient data, and persistent data are set to null. The set instance is also set to null and the garbage collector method is called for cleanup. The card software application then notifies the control software application about the deletion using the SIO.
In certain exemplary embodiments, all card software applications other than the MasterCard type card software applications may be allocated a memory size limitation. The persistent memory typically stores code and data, while transient memory can provide such data as the number of instances of card software applications available to the user. For example, only two MChip instances may be installed within the smart card. Further, it may be possible to free memory for a removed payment application, but it may not be possible to free memory in the secure element for a deselected application. When only one card software application and its instance exists, then the AID length can be set to a default at 7 bytes, while more than one instance changes the AID length requirement to 8 bytes.
In certain exemplary embodiments, the systems and methods of implementing a secure element control software application to control the PPSE and the individual card software applications, and the process of personalizing payment applications to conform to the control software application, may be described in a service level agreement (SLA) between the control application owner and the payment card software application owner. The SLA defines the level of personalization and interaction allowed between the payment card software application and the controller application. The SLA defines business rules that will be automatically implemented when the payment device owner selects a payment card software application for installing on the device from a trusted server. As illustrated inFIG. 1, the control software application in the secure element interacts with the wallet application, where the wallet application is available to a user via a graphical user interface (GUI) of the contactless payment device. The wallet application secures data from the secure element and displays aggregated payment options to the user. The SLA defines business rules to control the payment card software application priority with respect to the reader terminals at points-of-sale. The control software application can prevent the reader terminal from applying certain forceful methods to select a payment card software application from a list of available options. For example, the control software application can prevent readers from choosing a certain credit card application over a different credit card application.
FIG. 4 depicts a flowchart illustrating amethod400 for controlling multiple secure element based card software applications using a secure element based control software application according to certain exemplary embodiments. The method includes receiving a card software application AID and a software code for an instruction to be performed on the selected card application applet as represented inblock405. Inblock410, the received software code instruction is executed within the secure element to perform certain functions on the card software application represented by the received AID.
In certain exemplary embodiments, the received software coded instruction may be a short software coded remote method invocation (RMI) to an existing API within the secure element to perform a function on the selected card software application. In another exemplary embodiment, the software coded instruction may be the function itself that is rendered within the virtual machine in the secure element of the smart card. Further, if the software coded instruction is received from the wallet application, then the instruction is in the APDU format, and may be issued to a process method of the card software applet representing the selected AID. The instructions may include at least, “install,” “delete,” “activate,” “deactivate,” and “prioritize.” The prioritize instruction contains information on where to place the selected card software application from among the list of registered active card software applications.
Block415 triggers an update to the registeredlist332 of card software applications stored with a software coded tag responsive to the instruction performed. The tags are stored in theevent logging list340 as depicted inFIG. 3. The updated list of the card software application is synchronized, via an update, block420, with the PPSE list, or in the alternative, the PPSE list is directly altered to reflect the changes requested by the software coded instruction. In certain exemplary embodiments, the software coded instructions are rendered via the control software application to the list of registered applications within the PPSE applet, thereby eliminating the redundancy of a UPL and a PPSE based FCI list.
FIG. 5 depicts a flowchart illustrating a method for controlling multiple secure element based card software applications using a secure element based control software application, block500, according to certain exemplary embodiments. A user request on the user-interface of the control software application inblock500 modifies the PPSE in block504 and the UPL inblock512. The PPSE in block504 may be indirectly updated using a synchronization of the updates made to the UPL inblock512, after updating the UPL. The terminal reader represented byblock508 polls for radio wave based devices in the vicinity of the reader. When the reader device appears, the reader inblock508 requests the root or default directory, thePPSE block520 in this case, for analyzing the transaction options available to the reader.
In certain exemplary embodiments, the FCI directory list is returned to the user in short sized (7 byte) AIDs depicted inblock524. The terminal process inblock528 analyzes the data received and selects a 7 byte AID among the FCI list. The selected 7 byte AID is sent, referenced inblock532, to the card software applications list (UPL) in the control software application. Inblock540, the selected short AID is compared to the UPL list to retrieve the full size AID related to it. The SIO of the selected full size AID is accessed via a client mode function for the control software application and the full size AID with SIO data is returned to the control software application, perblock544. The full size AID is exchanged for the related 7 byte AID, and the data, along with the 7 byte AID, is transmitted to the terminal for processing, block556. The 7 byte AID and its related full sized AID are then used for the next set of card software related function transactions with the UPL providing the exchange of short and full size AID at each transaction process shown in blocks560-572.
FIG. 6 depicts a flowchart illustrating a method600 for using sharable interface objects (SIOs) to share data between a control applet and multiple card applets across at least one secure firewall in a secure element of a contactless smart card, according to certain exemplary embodiments. The contactless smart card includes a number of software applications, each designed to perform certain pre-defined tasks. By way of an example, a directory software application (e.g., the PPSE) may be accessible to an external card reader to present the reader with options of the active card software applications available for transactions from the contactless smart card. The card software applications communicate with an external card reader to provide credit/debit account information, coupon information, membership information, loyalty information, and other related applications via APDU commands as described above. A control software application communicates with the card software applications and also may communicate with an external software application outside the secure element, e.g., a user-interface software application rendered on a contactless payment device that is in electronic, optical, or radio contact with the contactless smart card. In one example, a contactless payment device may be a mobile phone, while the contactless smart card may be incorporated within a SIM card, U-RIM card, an embedded chip or an external SD card, or any type of smart card, as discussed above.
Thecontrol software application224 inFIG. 2 communicates via SIOs236 with the card software applications236 (shown as the “card software applications”). Each software application, for purposes of transaction, control, directory, or any other smart card function is loaded into the smart card as an application package. The application package includes multiple computer-coded files for installation within the smart card. When installed in the secure element, the application package creates its own SIO within an application memory context assigned to the application package by the runtime environment of the smart card. The creation of SIO related to a control applet and at least one card applet is depicted viablock605. The application memory contexts are independent object spaces defined by a firewall that separates each of the contexts. By way of an example, a Java card runtime environment (JCRE) allocates an area within the smart card memory for storing the application package and associated data objects. When an application package renders within the runtime environment of the smart card during execution, the application generates data that is stored within the fields of the associated data objects. Each of the allocated application memory contexts forms a secure and isolated memory area for the overlying software application and data object. For a software application instance that is installed within an existing application package, the application instance and the SIO of the instance share the same context with its parent application package. In the Java Card implementation, the application package is a class file and the application instances are instances of the classes.
When applications and their instances reside within the same context, the SIOs related to the application and their instances may be shared by each of the other instances within the context without special access requests. Accordingly, a card software application, which in a Java Card implementation is a card applet, may obtain data from SIO fields of other instances of the card applet by requesting the data directly from the parent applet that owns the SIO. However, when for application packages that are installed in one application memory context, their SIOs are limited for access by firewalls of the application memory context. In an exemplary embodiment, block610 depicts the step in method600, for enabling applets to request for access to SIOs across a firewall, where the requisition is implemented viablock615, using process method function calls of the runtime environment. Accordingly, a software application or its instance that resides in a different application memory context has to perform a client role by initiating an access request via the runtime environment process method function calls to a server card applet including the intended SIO data to be accessed across the firewall. After access is granted, block620 depicts a method step, where the client software application may invoke process method function calls in the server applet to access the data in the server applet's SIO.
Inblock625, an exemplary embodiment of tracking information related to one of a number of SIOs is depicted. The control applet and the directory applet stores a registered list of card applets available within the smart card device. The directory applet may only register the active card applets from data provided by the control applet on the status of each of the card applets. The data provided by the control applet is stored in pre-defined fields of the control applet SIO as illustrated inFIG. 2 at236B. Only the active instances or application packages (illustrated as220 inFIG. 2) from the control application SIO are listed in the directory application SIO, and may be presented to an external card reader. Accordingly, when an SIO owned by a card applet is accessed by the control applet or the directory applet for performing an action on the card applet, such action is recorded by updating data tags related to the card applet viablock625. Actions performed on the card applet include, a delete action, a select event, a block event, an unblock event, a personal identification number (PIN) verified event, a PIN failed event, and a payment transaction event. The data tag is illustrated inFIG. 3 at336G-H, where thedata228 is retrieved from the SIO of the control applet.
FIG. 7 depicts a flowchart illustrating a method for managing the lifecycle of a card software application received from a remote trusted service manager (TSM) to a secure element of a contactless smart card, according to certain exemplary embodiments. Card software applications may be downloaded to the secure element of a smart card from remote servers via a wireless connection offered by a mobile service provider or a direct to server connection using Wi-Fi. In a Java Card implementation, the card software applications are card applets, which may be installed within the secure element for use with an external card reader. The card software application includes information related to the type of transaction function the application will perform. By way of an example, the card software application may be used to access a credit card account, a debit card account, a loyalty card account, a web-based coupon account, a membership account, a gift card account, or an access card account. The account information is stored within the card and is verified by an external card reader using secure contactless communication with the card software application on the card.
Block705 depicts a receiving step, where the TSM includes trusted service agents to authenticate requests for card software applications from remote contactless payment devices that include the smart card. The TSM also authenticates instructions for functions to be performed on new or installed card software applications. The card software applications are typically in a computer-coded form, for example, in a Java Card implementation, the card software application may be in CAP file, where the CAP file is a compressed set of components including bytecode, class information, links, and verification information. The smart card receives the card software application, along with an AID or an AID may be assigned to the application by the runtime environment.Block710 performs the rendering step, wherein the received instruction is rendered to perform the function of the received card software application. Alternatively, the function may be performed on an existing card software application.Block715 performs a registration step for the card software application, where the AID of the card software application is listed in the control software application along with a computer coded tag, the computer coded tag responsive to the function performed on the card software application. The registration process involves, in one exemplary embodiment, listing the AID code received with the card software application with a status tag that defines the status of the application. The receipt of a card software application from a TSM, installation, and registration of the card software application is illustrated inFIG. 3, and has been described in detail with reference to the exemplary system and device ofFIG. 3. The instructions that may be performed on the card software application using process methods include delete, activate, de-activate, add instance, install, block, and unblock.
The TSM also provides instructions to the contactless smart card based on requests received by a user of the contactless smart card. By way of an example, if the user wants to activate/deactivate a card software application registered within the control software application, the user issues a request to the control software application. However, the user may not be able to directly send data or instructions for functions to the control software application, as the controls software application is resident within the secure element. Accordingly, the user needs to secure authentication for instructions prior to the control software application receiving and rendering the instruction. The TSM provides authentication for instructions received by the smart card from the user of the smart card device. When the smart card is embedded within a contactless payment device, the user may provide an instruction via a user-interface software application that renders on the contactless payment device.
In a Java Card implementation, a user-interface MIDlet is deployed on the contactless payment device, where the MIDlet passes user input to the runtime environment (or JCRE) of the smart card, and the runtime environment authenticates the instructions via process method function calls to the TSM. The authenticated computer coded instruction is sent to the runtime environment for rendering. Alternatively, the TSM may issue pre-defined instructions for such exemplary external functions, as blocking/unblocking a card software application because of such issues as a theft, over-uses, or account overdraft. Such pre-defined instructions do not need external requests to the control software application, but may deploy directly to the control software application for rendering.Block710 depicts a step ofmethod700 wherein the TSM sends one of number of available instructions to be performed on the card software application. The instruction from the TSM may be in the form of a software code to invoke a process method function call of the card runtime environment.Block720 uses process methods in the card runtime environment to update the card application status tag in the control software application with a computer code related to the instruction performed.
FIG. 8 depicts a flowchart illustrating amethod800 to utilize a card software application to route external card reader requests to one of a plurality of alternate card software applications, according to certain exemplary embodiments.Block805 depicts the selection of a card software application, where process method function calls using the appropriate AID of one of a number of registered card software applications is selected. Inblock810, an authentication process is performed to enable an external device, for example, the contactless payment device or an external device, to edit the selected card software application. In one example, the authentication is implemented by using issuer security domain (ISD) keys, which are accessible via process method function calls defined by the issuer of the smart card for the card runtime environment. The ISD keys may be defined by the card issuer to protect application memory contexts within the secure element. The ISD key may offer a firewall type protection for applications in the secure element.
Block815 depicts the editing step of the exemplary embodiment ofmethod800. Once an external device gains access to the card software application, certain data fields may be edited. In certain exemplary embodiments, the file control information (FCI), a priority status tag, and application discretionary data may be edited. Applets, in the form of the control software application or the card software application typically return a success status when an external card reader selects an application. However, when the selected card software application's FCI data is activated, then the selected card software application returns the FCI data retrieved from an SIO that includes the FCI data as an object field. The FCI data is returned in a tag length value (TLV) format as disclosed above. The FCI data may be edited to include additional AID bytes, where the external card reader selects a short (or 7 byte) AID, and the selected card software application automatically routes the selection to an instance of the card software application, the instance including a full sized AID.
Further, the edited FCI can be edited to include routing information to route an external card reader request received at the card software application to an alternate AID of an alternate card software application. The editing and routing in the card software application enables the smart card to route external card reader requests to any underlying active instance of the card software application. Accordingly, multiple instances of a card software application may reside on the smart card, with one of the instances designated as an active instance. Further, in the case of a legacy reader that may read a short sized AID with 7 bytes of AID data, the reader may be routed to the complete AID using the edited AID as an intermediate routing application.
Block820 depicts the installation process that follows the editing, where the edited card software application is installed for “make selectable,” which causes the runtime environment to instantiate a related card sharable interface object (SIO), the card SIO including the alternate AID defined for retrieval by the FCI as described above.
As mentioned previously, themethod800 is useful with secure element payment applications for legacy readers. Certain legacy readers recognize only applets having a short-form AID. However, the long-form AID applets can allow more functionality and specifically can allow use of multiple software applications within a mobile device. A legacy card reader requests invocation of a software applet based on the short-form AID known to the legacy card reader. A router applet operating on the mobile device receives the request for the short-form AID applet, determines the long-form AID applet corresponding to the short-form AID applet, and routes the request to the long-form AID applet, thereby invoking the long-form AID applet. In this manner, legacy readers that have stored therein only the short-form AID applet can invoke the functionality of the long-form AID applet on the smart card. Additionally, newer readers implementing the long-form AID applet can request directly the long-form AID applet.
FIG. 9 depicts a flowchart illustrating amethod900 for communication between a software application midlet of a contactless payment device and a control applet resident within a secure element of a smart card, according to certain exemplary embodiments. In a Java Card implementation, a midlet is a user accessible software application, while the applet is typically an embedded software application with the secure element, inaccessible to external software applications and users. Accordingly, a software application midlet residing outside the secure element may need TSM authentication prior to performing various functions on the card software applications within the secure element. A secure channel for communication may be implemented for enabling the midlet to communicate with the applet, thereby enabling certain functions to be performed without TSM intervention. The secure element typically provides cryptographic and firewall blocks against external access to an applet within the secure element. ISD keys defined by the card issuer or the card runtime environment can be made available to the midlet to access the secure channel.
Many primary functions, such as de-activate and activate for a card applet within the secure element require TSM permissions prior to implementation. Using ISD keys, via process method function calls of the card issuer or the card runtime environment, allows some primary functions to be performed on a card applet using input from a user on an insecure midlet.Block905 depicts a selection step to identify at least one card applet to configure from a midlet residing outside the secure element. The selection step uses the AID of the intended applet to identify the applet. In an exemplary embodiment, the midlet recognizes the name of the card applet from the user input and extracts an AID related to the name, where the AID is used for the remainder of the steps.Block910 includes application programmable interface (API) function calls for transmitting the AID of the selected card applet, and for encrypting and transmitting a computer coded instruction for a function to be performed on the card applet. The stored keys in the secure element can be used to verify and decrypt the receiving computer-coded instruction.Block915 depicts an invoking step, where the control applet initiates process method function calls defined by the card issuer or the card runtime environment. The invoked process method function calls perform the selected function defined in the computer-coded instruction selected by a user on the midlet. The card runtime environment renders, viablock920, the process method function call, thereby performing the selected function on the selected card applet.
One or more aspects of the invention may include a computer program that embodies the functions described and illustrated herein, wherein the computer program is implemented in a computer system that includes instructions stored in a machine-readable medium and a processor that executes the instructions. However, it should be apparent that there could be many different ways of implementing the invention in computer programming, and the invention should not be construed as limited to any one set of computer program instructions. Further, a skilled programmer would be able to write such a computer program to implement an embodiment of the disclosed invention based on the appended flow charts and associated description in the application text. Therefore, disclosure of a particular set of program code instructions is not considered necessary for an adequate understanding of how to make and use the invention. The inventive functionality of the invention will be explained in more detail in the following description of exemplary embodiments, read in conjunction with the figures illustrating the program flow.
The exemplary methods and acts described in the embodiments presented previously are illustrative, and, in alternative embodiments, certain acts can be performed in a different order, in parallel with one another, omitted entirely, and/or combined between different exemplary embodiments, and/or certain additional acts can be performed, without departing from the scope and spirit of the invention. Accordingly, such alternative embodiments are included in the inventions described herein.
The exemplary embodiments can be used with computer hardware and software that perform the methods and processing functions described above. As will be appreciated by those having ordinary skill in that art, the systems, methods, and procedures described herein can be embodied in a programmable computer, computer executable software, or digital circuitry. The software can be stored on computer readable media. For example, computer readable media can include a floppy disk, RAM, ROM, hard disk, removable media, flash memory, memory stick, optical media, magneto-optical media, CD-ROM, etc. Digital circuitry can include integrated circuits, gate arrays, building block logic, field programmable gate arrays (“FPGA”), etc.
Although specific embodiments have been described above in detail, the description is merely for purposes of illustration. It should be appreciated, therefore, that many aspects described above are not intended as required or essential elements unless explicitly stated otherwise. Various modifications of, and equivalent acts corresponding to, the disclosed aspects of the exemplary embodiments, in addition to those described above, can be made by a person of ordinary skill in the art, having the benefit of the present disclosure, without departing from the spirit and scope of the invention defined in the following claims, the scope of which is to be accorded the broadest interpretation so as to encompass such modifications and equivalent structures.

Claims (20)

What is claimed is:
1. A computer-implemented method for communication within payment devices configured to conduct payments via contactless communication, comprising:
supporting a first secure and isolated memory of a secure element embedded within a chip of a payment device configured to conduct a payment via contactless communication;
locating a control applet and a first sharable interface object (SIO) owned by the control applet within the first secure and isolated memory;
selecting, on a software application of the payment device, a selected card applet to configure from a registered list of card applets, the registered list of card applets comprising application identifiers (AIDs) of card applets within the secure element;
supporting a second secure and isolated memory of the secure element embedded within the chip;
locating the selected card applet and a second SIO owned by the selected card applet within the second secure and isolated memory;
transmitting, through a secure channel, to the control applet within the first secure and isolated memory, an AID associated with the selected card applet and a computer-coded instruction for a selected function to be performed on the selected card applet;
requesting data access from the control applet located within the first secure and isolated memory to the second SIO located within the second secure and isolated memory across a secure firewall within the secure element;
invoking, by the control applet, process method function calls of a card runtime environment, wherein the process method function calls perform the selected function on the selected card applet; and
executing, by the card runtime environment, the process method function calls, thereby performing the selected function on the selected card applet.
2. The method according toclaim 1, further comprising updating, in the secure element, the registered list of card applet AIDs, wherein the selected card applet AID entry is edited or tagged with a computer code responsive to the function performed.
3. The method according toclaim 1, wherein the software application is a user-interface software application configured to receive the selected function from a plurality of available functions.
4. The method according toclaim 1, wherein the card runtime environment is a Java Card Runtime Environment (JCRE).
5. The method according toclaim 1, wherein the secure channel is provided by authenticating the computer-coded instruction from the software application using issuer security domain (ISD) key protected process method function calls within the secure element for performing the function responsive to the computer-coded instruction.
6. The method according toclaim 1, wherein the process method function calls are application programmable interface (API) functions configured to execute within the card runtime environment.
7. The method according toclaim 1, wherein the card applet is a smart card application software package or a software instance to be installed within an existing smart card application package, the software package or instance comprising information to access a credit card account, a debit card account, a loyalty card account, a web-based coupon account, a membership account, a gift card account, or an access card account.
8. The method according toclaim 2, wherein the list of card applet AIDs in the secure element is located in one of the control applet or a directory applet, the directory applet comprising only activated card applet AIDs for transaction purposes with an external card reader.
9. The method according toclaim 8, wherein the directory applet is only updated to indicate if the selected card applet is activated, deactivated, blocked, or unblocked.
10. A payment device, comprising:
a secure element embedded within a chip, the secure element comprising:
a first memory,
a second memory,
a control applet,
a first sharable interface object (SIO) within the first memory and owned by the control applet,
a plurality of card applets,
a second SIO within the second memory and owned by one of the plurality of card applets,
a firewall operable to separate the first SIO within the first memory and the second SIO within the second memory and to support secure data access and transfer between the first SIO within the first memory and the second SIO within the second memory through the firewall, and
a registered list of the card applets, wherein the registered list comprises an application identifier (AID) for each of the card applets resident in the secure element,
a software application midlet that receives an input of a selection of at least one of the plurality of card applets to configure from the registered list of card applets, and
a secure channel via which the selected card applet's AID and a computer-coded instruction for a selected function to be performed on the selected card applet are communicated to the control applet on the secure element,
wherein the control applet requests data access to the second SIO across the firewall and invokes process method function calls of a card runtime environment, wherein the process method function calls are defined by a card issuer corresponding to the selected card applet to perform the selected function on the selected card applet, and
wherein the card runtime environment executes the process method function calls, thereby performing the selected function on the selected card applet.
11. The device according toclaim 10, wherein the secure element updates the registered list of card applet AIDs, and wherein the selected card applet AID entry is edited or tagged with a computer code responsive to the function performed.
12. The device according toclaim 10, wherein the software application midlet is a user-interface software application configured to receive an input of the selected function from a plurality of available functions.
13. The device according toclaim 10, wherein the card runtime environment is a Java Card Runtime Environment (JCRE).
14. The device according toclaim 10, wherein the secure channel is provided by authenticating the computer-coded instruction from the software application midlet using issuer security domain (ISD) key protected process method function calls within the secure element for performing the function responsive to the computer-coded instruction.
15. The device according toclaim 10, wherein the process method function calls are application programmable interface (API) functions configured to execute within the card runtime environment.
16. The device according toclaim 10, wherein the card applet is a smart card application software package or a software instance to be installed within an existing smart card application package, the software package or instance comprising information to access a credit card account, a debit card account, a loyalty card account, a web-based coupon account, a membership account, a gift card account, or an access card account.
17. The device according toclaim 11, wherein the list of card applet AIDs in the secure element is located in one of the control applet or a directory applet, wherein the directory applet comprises only activated card applet AIDs for transaction purposes with an external card reader.
18. The device according toclaim 17, wherein the directory applet is only updated to indicate if the selected card applet is activated, deactivated, blocked, or unblocked.
19. A payment device, comprising:
a secure element embedded within a chip of a device used for payments;
a first memory embedded within the secure element, the first memory operable to store a control application and a first sharable interface object (SIO) within and owned by the control application;
a second memory embedded within the secure element, the second memory operable to store a card application and a second SIO within and owned by the card application;
a secure firewall embedded within the secure element operable to separate the first SIO and the second SIO, the secure firewall being further operable to support secure data transfer between the first SIO and the second SIO through the firewall in response to the control applet requesting data access from to the second SIO through the secure firewall; and
a card runtime environment operable to receive, from a remote trusted service manager (TSM), a received application identifier (AID) code and one or more computer-coded instructions, wherein the one or more computer coded instructions support performing a function upon the card application through the secure firewall in response to the received AID corresponding to an AID associated with the card application.
20. The device according toclaim 19, wherein the device is a mobile communications device or a card.
US13/244,7772010-12-172011-09-26Wallet application for interacting with a secure element application without a trusted server for authenticationActiveUS8646059B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US13/244,777US8646059B1 (en)2010-12-172011-09-26Wallet application for interacting with a secure element application without a trusted server for authentication

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201061424609P2010-12-172010-12-17
US13/244,777US8646059B1 (en)2010-12-172011-09-26Wallet application for interacting with a secure element application without a trusted server for authentication

Publications (1)

Publication NumberPublication Date
US8646059B1true US8646059B1 (en)2014-02-04

Family

ID=46148193

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US13/244,806ActiveUS8196131B1 (en)2010-12-172011-09-26Payment application lifecycle management in a contactless smart card
US13/244,775Active2031-09-27US8807440B1 (en)2010-12-172011-09-26Routing secure element payment requests to an alternate application
US13/244,777ActiveUS8646059B1 (en)2010-12-172011-09-26Wallet application for interacting with a secure element application without a trusted server for authentication

Family Applications Before (2)

Application NumberTitlePriority DateFiling Date
US13/244,806ActiveUS8196131B1 (en)2010-12-172011-09-26Payment application lifecycle management in a contactless smart card
US13/244,775Active2031-09-27US8807440B1 (en)2010-12-172011-09-26Routing secure element payment requests to an alternate application

Country Status (1)

CountryLink
US (3)US8196131B1 (en)

Cited By (168)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20100293382A1 (en)*2009-05-152010-11-18Ayman HammadVerification of portable consumer devices
US20120278798A1 (en)*2010-01-222012-11-01Gan QiangMethod and apparatus for integrating java software into mobile terminal, and mobile terminal
US20140006194A1 (en)*2006-09-242014-01-02Rfcyber CorporationMethod and apparatus for settling payments using mobile devices
US20140189880A1 (en)*2012-12-312014-07-03Gemalto SaSystem and method for administrating access control rules on a secure element
US8827154B2 (en)2009-05-152014-09-09Visa International Service AssociationVerification of portable consumer devices
US20140279559A1 (en)*2013-03-152014-09-18Mastercard International IncorporatedSystem and method for using multiple payment accounts using a single payment device
US20140298484A1 (en)*2013-03-262014-10-02Jvl Ventures LlcSystems, methods, and computer program products for managing access control
US20140351806A1 (en)*2013-05-212014-11-27Jvl Ventures, LlcSystems, methods, and computer program products for managing service upgrades
CN104714890A (en)*2015-04-132015-06-17东信和平科技股份有限公司Method and system for detecting intelligent card in cross-platform way
CN105045597A (en)*2015-08-072015-11-11中国联合网络通信集团有限公司JAVA card object calling method and apparatus
US9256871B2 (en)2012-07-262016-02-09Visa U.S.A. Inc.Configurable payment tokens
US9280765B2 (en)2011-04-112016-03-08Visa International Service AssociationMultiple tokenization for authentication
US20160077819A1 (en)*2014-09-162016-03-17Xiaomi Inc.Method and device for running application program
US9317848B2 (en)2009-05-152016-04-19Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US20160150410A1 (en)*2014-11-252016-05-26Google Inc.Securely Accessing Secure Elements
US9355391B2 (en)2010-12-172016-05-31Google Inc.Digital wallet
US9372971B2 (en)2009-05-152016-06-21Visa International Service AssociationIntegration of verification tokens with portable computing devices
US20160191527A1 (en)*2013-08-072016-06-30Giesecke & Devrient GmbhMethod for Operating a Security Element
US9424413B2 (en)2010-02-242016-08-23Visa International Service AssociationIntegration of payment capability into secure elements of computers
US20160255055A1 (en)*2015-01-292016-09-01Google Inc.Controlling Access To Resource Functions At A Control Point Of The Resource Via A User Device
US9516487B2 (en)2013-11-192016-12-06Visa International Service AssociationAutomated account provisioning
US9524501B2 (en)2012-06-062016-12-20Visa International Service AssociationMethod and system for correlating diverse transaction data
US9530131B2 (en)2008-07-292016-12-27Visa U.S.A. Inc.Transaction processing using a global unique identifier
US9547769B2 (en)2012-07-032017-01-17Visa International Service AssociationData protection hub
US20170024709A1 (en)*2009-08-112017-01-26Felica Networks, Inc.Information processing apparatus, program, and information processing system
US9582801B2 (en)2009-05-152017-02-28Visa International Service AssociationSecure communication of payment information to merchants using a verification token
US20170099320A1 (en)*2015-06-172017-04-06MorphoMethod for deploying an application in a secure element
US9646303B2 (en)2013-08-152017-05-09Visa International Service AssociationSecure remote payment transaction processing using a secure element
US9665722B2 (en)2012-08-102017-05-30Visa International Service AssociationPrivacy firewall
US9680942B2 (en)2014-05-012017-06-13Visa International Service AssociationData verification using access device
US9704155B2 (en)2011-07-292017-07-11Visa International Service AssociationPassing payment tokens through an hop/sop
US9715681B2 (en)2009-04-282017-07-25Visa International Service AssociationVerification of portable consumer devices
US9741051B2 (en)2013-01-022017-08-22Visa International Service AssociationTokenization and third-party interaction
US9775029B2 (en)2014-08-222017-09-26Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US9780953B2 (en)2014-07-232017-10-03Visa International Service AssociationSystems and methods for secure detokenization
US9792611B2 (en)2009-05-152017-10-17Visa International Service AssociationSecure authentication system and method
US9830595B2 (en)2012-01-262017-11-28Visa International Service AssociationSystem and method of providing tokenization as a service
US9846861B2 (en)2012-07-252017-12-19Visa International Service AssociationUpstream and downstream data conversion
US9846878B2 (en)2014-01-142017-12-19Visa International Service AssociationPayment account identifier system
US9848052B2 (en)2014-05-052017-12-19Visa International Service AssociationSystem and method for token domain control
US9858429B2 (en)2014-12-012018-01-02Samsung Electronics Co., Ltd.Methods of data transfer in electronic devices
US9898740B2 (en)2008-11-062018-02-20Visa International Service AssociationOnline challenge-response
US9911118B2 (en)2012-11-212018-03-06Visa International Service AssociationDevice pairing via trusted intermediary
RU2647625C2 (en)*2014-09-162018-03-16Сяоми Инк.Application program running method and device
US9922322B2 (en)2013-12-192018-03-20Visa International Service AssociationCloud-based transactions with magnetic secure transmission
US9942043B2 (en)2014-04-232018-04-10Visa International Service AssociationToken security on a communication device
US9959531B2 (en)2011-08-182018-05-01Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US9972005B2 (en)2013-12-192018-05-15Visa International Service AssociationCloud-based transactions methods and systems
US9978094B2 (en)2013-10-112018-05-22Visa International Service AssociationTokenization revocation list
US9978062B2 (en)2013-05-152018-05-22Visa International Service AssociationMobile tokenization hub
US9992616B2 (en)2014-09-302018-06-05Huawei Technologies Co., Ltd.Information processing method and NFC terminal
US9998978B2 (en)2015-04-162018-06-12Visa International Service AssociationSystems and methods for processing dormant virtual access devices
US9996835B2 (en)2013-07-242018-06-12Visa International Service AssociationSystems and methods for communicating token attributes associated with a token vault
US10015147B2 (en)2014-10-222018-07-03Visa International Service AssociationToken enrollment system and method
US20180189777A1 (en)*2016-12-302018-07-05Square, Inc.Third-party access to secure hardware
US10026087B2 (en)2014-04-082018-07-17Visa International Service AssociationData passed in an interaction
US10043178B2 (en)2007-06-252018-08-07Visa International Service AssociationSecure mobile payment system
US10078832B2 (en)2011-08-242018-09-18Visa International Service AssociationMethod for using barcodes and mobile devices to conduct payment transactions
US10096009B2 (en)2015-01-202018-10-09Visa International Service AssociationSecure payment processing using authorization request
US10121129B2 (en)2011-07-052018-11-06Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10140615B2 (en)2014-09-222018-11-27Visa International Service AssociationSecure mobile device credential provisioning using risk decision non-overrides
US10147089B2 (en)2012-01-052018-12-04Visa International Service AssociationData protection with translation
US10154084B2 (en)2011-07-052018-12-11Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US10164996B2 (en)2015-03-122018-12-25Visa International Service AssociationMethods and systems for providing a low value token buffer
US10176478B2 (en)2012-10-232019-01-08Visa International Service AssociationTransaction initiation determination system utilizing transaction data elements
US10187363B2 (en)2014-12-312019-01-22Visa International Service AssociationHybrid integration of software development kit with secure execution environment
US10192216B2 (en)2012-09-112019-01-29Visa International Service AssociationCloud-based virtual wallet NFC apparatuses, methods and systems
US10212148B2 (en)2013-12-162019-02-19Mbr Innovations LlcSystems and methods for verifying attributes of users of online systems
US10223710B2 (en)2013-01-042019-03-05Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US10223730B2 (en)2011-09-232019-03-05Visa International Service AssociationE-wallet store injection search apparatuses, methods and systems
US10223691B2 (en)2011-02-222019-03-05Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US10243958B2 (en)2016-01-072019-03-26Visa International Service AssociationSystems and methods for device push provisoning
US10242358B2 (en)2011-08-182019-03-26Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US10257185B2 (en)2014-12-122019-04-09Visa International Service AssociationAutomated access data provisioning
US10255591B2 (en)2009-12-182019-04-09Visa International Service AssociationPayment channel returning limited use proxy dynamic value
US10255456B2 (en)2014-09-262019-04-09Visa International Service AssociationRemote server encrypted data provisioning system and methods
US10255601B2 (en)2010-02-252019-04-09Visa International Service AssociationMultifactor authentication using a directory server
US10262001B2 (en)2012-02-022019-04-16Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US10262308B2 (en)2007-06-252019-04-16Visa U.S.A. Inc.Cardless challenge systems and methods
US10282724B2 (en)2012-03-062019-05-07Visa International Service AssociationSecurity system incorporating mobile device
US10289999B2 (en)2005-09-062019-05-14Visa U.S.A. Inc.System and method for secured account numbers in proximity devices
US10304047B2 (en)2012-12-072019-05-28Visa International Service AssociationToken generating component
US10313321B2 (en)2016-04-072019-06-04Visa International Service AssociationTokenization of co-network accounts
US10325261B2 (en)2014-11-252019-06-18Visa International Service AssociationSystems communications with non-sensitive identifiers
US10333921B2 (en)2015-04-102019-06-25Visa International Service AssociationBrowser integration with Cryptogram
US10346848B2 (en)2015-06-072019-07-09Apple Inc.Provisioning multiple secure credentials on an electronic device
US10361856B2 (en)2016-06-242019-07-23Visa International Service AssociationUnique token authentication cryptogram
US10366387B2 (en)2013-10-292019-07-30Visa International Service AssociationDigital wallet system and method
US10373133B2 (en)2010-03-032019-08-06Visa International Service AssociationPortable account number for consumer payment account
US10433128B2 (en)2014-01-072019-10-01Visa International Service AssociationMethods and systems for provisioning multiple devices
US10484345B2 (en)2014-07-312019-11-19Visa International Service AssociationSystem and method for identity verification across mobile applications
US10489779B2 (en)2013-10-212019-11-26Visa International Service AssociationMulti-network token bin routing with defined verification parameters
US10491389B2 (en)2017-07-142019-11-26Visa International Service AssociationToken provisioning utilizing a secure authentication system
US10496986B2 (en)2013-08-082019-12-03Visa International Service AssociationMulti-network tokenization processing
US10510073B2 (en)2013-08-082019-12-17Visa International Service AssociationMethods and systems for provisioning mobile devices with payment credentials
US10509779B2 (en)2016-09-142019-12-17Visa International Service AssociationSelf-cleaning token vault
US10515358B2 (en)2013-10-182019-12-24Visa International Service AssociationContextual transaction token methods and systems
US10552808B1 (en)2014-08-202020-02-04Square, Inc.Payment via messaging application
US10552834B2 (en)2015-04-302020-02-04Visa International Service AssociationTokenization capable authentication framework
US10586229B2 (en)2010-01-122020-03-10Visa International Service AssociationAnytime validation tokens
US10586227B2 (en)2011-02-162020-03-10Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US10592710B1 (en)2018-10-022020-03-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020052753A1 (en)*2018-09-122020-03-19Huawei Technologies Co., Ltd.Intermediary system for faciliting communication between virtual smart cards and a smart card interface
US10599448B2 (en)*2012-01-172020-03-24Sony CorporationInformation processing apparatus, IC chip, information processing method, and information processing system
US10607212B2 (en)2013-07-152020-03-31Visa International Services AssociationSecure remote payment transaction processing
US10664844B2 (en)2015-12-042020-05-26Visa International Service AssociationUnique code for token verification
US10726413B2 (en)2010-08-122020-07-28Visa International Service AssociationSecuring external systems with account token substitution
US10733604B2 (en)2007-09-132020-08-04Visa U.S.A. Inc.Account permanence
US10740731B2 (en)2013-01-022020-08-11Visa International Service AssociationThird party settlement
US10769628B2 (en)2014-10-242020-09-08Visa Europe LimitedTransaction messaging
US10783517B2 (en)2016-12-302020-09-22Square, Inc.Third-party access to secure hardware
US10817875B2 (en)2013-09-202020-10-27Visa International Service AssociationSecure remote payment transaction processing including consumer authentication
US10825001B2 (en)2011-08-182020-11-03Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10846694B2 (en)2014-05-212020-11-24Visa International Service AssociationOffline authentication
US10846683B2 (en)2009-05-152020-11-24Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US10853790B2 (en)2015-09-252020-12-01Samsung Electronics Co., Ltd.Method of operating payment device for selectively enabling payment function according to validity of host
US10878422B2 (en)2013-06-172020-12-29Visa International Service AssociationSystem and method using merchant token
US10891610B2 (en)2013-10-112021-01-12Visa International Service AssociationNetwork token system
US10902418B2 (en)2017-05-022021-01-26Visa International Service AssociationSystem and method using interaction token
US10902421B2 (en)2013-07-262021-01-26Visa International Service AssociationProvisioning payment credentials to a consumer
US10915899B2 (en)2017-03-172021-02-09Visa International Service AssociationReplacing token on a multi-token user device
US10937021B2 (en)2014-12-032021-03-02Trec CorporationProprietary token-based universal payment processing system
US10937031B2 (en)2012-05-042021-03-02Visa International Service AssociationSystem and method for local data conversion
US20210073055A1 (en)*2017-03-062021-03-11Giesecke+Devrient Mobile Security GmbhCard device having applets and transfer of apdus to applets
US10956141B2 (en)*2016-12-072021-03-23Samsung Electronics Co., Ltd.Secure element management and electronic device performing same and installation package
US10977657B2 (en)2015-02-092021-04-13Visa International Service AssociationToken processing utilizing multiple authorizations
US10990967B2 (en)2016-07-192021-04-27Visa International Service AssociationMethod of distributing tokens and managing token relationships
US11004043B2 (en)2009-05-202021-05-11Visa International Service AssociationDevice including encrypted data for expiration date and verification value creation
US11010749B2 (en)2016-01-132021-05-18Samsung Electronics Co., LtdPayment processing method and electronic device supporting the same
US11018724B2 (en)*2006-09-242021-05-25Rfcyber Corp.Method and apparatus for emulating multiple cards in mobile devices
US11023890B2 (en)2014-06-052021-06-01Visa International Service AssociationIdentification and verification for provisioning mobile application
US11037138B2 (en)2011-08-182021-06-15Visa International Service AssociationThird-party value added wallet features and interfaces apparatuses, methods, and systems
US11055710B2 (en)2013-05-022021-07-06Visa International Service AssociationSystems and methods for verifying and processing transactions using virtual currency
US11068578B2 (en)2016-06-032021-07-20Visa International Service AssociationSubtoken management system for connected devices
US11068899B2 (en)2016-06-172021-07-20Visa International Service AssociationToken aggregation for multi-party transactions
US11068889B2 (en)2015-10-152021-07-20Visa International Service AssociationInstant token issuance
CN113168485A (en)*2018-11-212021-07-23三星电子株式会社 Electronic device for providing requested security service via secure element, and method for controlling the same electronic device
US11080696B2 (en)2016-02-012021-08-03Visa International Service AssociationSystems and methods for code display and use
US11176554B2 (en)2015-02-032021-11-16Visa International Service AssociationValidation identity tokens for transactions
US20210406869A1 (en)*2020-06-252021-12-30Mastercard International IncorporatedMethods, systems and computer program products for modifying contactless payment card configurations
US11238140B2 (en)2016-07-112022-02-01Visa International Service AssociationEncryption key exchange process using access device
US11250424B2 (en)2016-05-192022-02-15Visa International Service AssociationSystems and methods for creating subtokens using primary tokens
US11250391B2 (en)2015-01-302022-02-15Visa International Service AssociationToken check offline
US11256789B2 (en)2018-06-182022-02-22Visa International Service AssociationRecurring token transactions
US11257074B2 (en)2014-09-292022-02-22Visa International Service AssociationTransaction risk based token
US11288661B2 (en)2011-02-162022-03-29Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US11323443B2 (en)2016-11-282022-05-03Visa International Service AssociationAccess identifier provisioning to application
US11354723B2 (en)2011-09-232022-06-07Visa International Service AssociationSmart shopping cart with E-wallet store injection search
US11356257B2 (en)2018-03-072022-06-07Visa International Service AssociationSecure remote token release with online authentication
US11386421B2 (en)2016-04-192022-07-12Visa International Service AssociationSystems and methods for performing push transactions
US20220247565A1 (en)*2018-10-022022-08-04Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US11469895B2 (en)2018-11-142022-10-11Visa International Service AssociationCloud token provisioning of multiple tokens
US11494765B2 (en)2017-05-112022-11-08Visa International Service AssociationSecure remote transaction system using mobile devices
US11580519B2 (en)2014-12-122023-02-14Visa International Service AssociationProvisioning platform for machine-to-machine devices
US11620643B2 (en)2014-11-262023-04-04Visa International Service AssociationTokenization request via access device
US20230222477A1 (en)*2017-09-162023-07-13Peter GarrettProximal peer to peer money transfer
US11704629B2 (en)2015-01-272023-07-18Banma Zhixing Network (Hongkong) Co., LimitedMethods and devices for processing information card
US11727392B2 (en)2011-02-222023-08-15Visa International Service AssociationMulti-purpose virtual card transaction apparatuses, methods and systems
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
EP4123541A4 (en)*2020-12-082023-09-20China Unionpay Co., Ltd.Card management method, user terminal, server, card management system, and storage medium
US11777934B2 (en)2018-08-222023-10-03Visa International Service AssociationMethod and system for token provisioning and processing
EP4123540A4 (en)*2020-12-232023-10-04China Unionpay Co., Ltd METHOD FOR ACTIVATING A PAYMENT FUNCTION, TERMINAL DEVICE, SERVER, SYSTEM AND STORAGE MEDIUM
US11849042B2 (en)2019-05-172023-12-19Visa International Service AssociationVirtual access credential interaction system and method
US11900361B2 (en)2016-02-092024-02-13Visa International Service AssociationResource provider account token provisioning and processing
US12028337B2 (en)2018-10-082024-07-02Visa International Service AssociationTechniques for token proximity transactions
US12026705B2 (en)2013-11-042024-07-02Apple Inc.System and method for payments using biometric authentication
WO2024187162A1 (en)*2023-03-082024-09-12Entrust CorporationAccount and payment processing platform
US12141800B2 (en)2021-02-122024-11-12Visa International Service AssociationInteraction account tokenization system and method

Families Citing this family (293)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090172678A1 (en)*2007-12-282009-07-02Mastercard International, Inc.Method And System For Controlling The Functionality Of A Transaction Device
US8447669B2 (en)2008-08-262013-05-21Visa U.S.A. Inc.System and method for implementing financial assistance programs
US20100114768A1 (en)2008-10-312010-05-06Wachovia CorporationPayment vehicle with on and off function
US10867298B1 (en)2008-10-312020-12-15Wells Fargo Bank, N.A.Payment vehicle with on and off function
JP5550439B2 (en)2010-05-062014-07-16キヤノン株式会社 How to install the application
US8984034B2 (en)*2010-09-282015-03-17Schneider Electric USA, Inc.Calculation engine and calculation providers
AU2011316955B2 (en)2010-10-202016-12-01Playspan Inc.Flexible monetization service apparatuses, methods and systems
US8621168B2 (en)2010-12-172013-12-31Google Inc.Partitioning the namespace of a contactless smart card
US8352749B2 (en)*2010-12-172013-01-08Google Inc.Local trusted services manager for a contactless smart card
EP2469484A1 (en)*2010-12-222012-06-27Gemalto SASmartcard receiving device for providing a remote communication with switching means
US10204327B2 (en)2011-02-052019-02-12Visa International Service AssociationMerchant-consumer bridging platform apparatuses, methods and systems
US9953334B2 (en)2011-02-102018-04-24Visa International Service AssociationElectronic coupon issuance and redemption apparatuses, methods and systems
AU2012223415B2 (en)2011-02-282017-05-18Visa International Service AssociationSecure anonymous transaction apparatuses, methods and systems
US9996838B2 (en)2011-03-042018-06-12Visa International Service AssociationCloud service facilitator apparatuses, methods and systems
WO2012155081A1 (en)2011-05-112012-11-15Visa International Service AssociationElectronic receipt manager apparatuses, methods and systems
AU2012261904A1 (en)2011-06-032013-11-28Visa International Service AssociationVirtual wallet card selection apparatuses, methods and systems
US8538845B2 (en)2011-06-032013-09-17Mozido, LlcMonetary transaction system
US10438176B2 (en)2011-07-172019-10-08Visa International Service AssociationMultiple merchant payment processor platform apparatuses, methods and systems
US10318941B2 (en)2011-12-132019-06-11Visa International Service AssociationPayment platform interface widget generation apparatuses, methods and systems
US8255687B1 (en)2011-09-152012-08-28Google Inc.Enabling users to select between secure service providers using a key escrow service
US8171525B1 (en)2011-09-152012-05-01Google Inc.Enabling users to select between secure service providers using a central trusted service manager
US8313036B1 (en)2011-09-162012-11-20Google Inc.Secure application directory
US9117225B2 (en)2011-09-162015-08-25Visa International Service AssociationApparatuses, methods and systems for transforming user infrastructure requests inputs to infrastructure design product and infrastructure allocation outputs
US9674272B2 (en)*2011-10-132017-06-06Sony CorporationInformation processing apparatus and method, and program
US8943320B2 (en)2011-10-312015-01-27Novell, Inc.Techniques for authentication via a mobile device
US9544759B2 (en)2011-11-012017-01-10Google Inc.Systems, methods, and computer program products for managing states
JP5793729B2 (en)2011-11-012015-10-14ジェーヴィーエル ベンチャ−ズ, エルエルシーJVL Ventures, LLC. Systems, methods, and computer program products for interfacing with multiple service provider trusted service managers and safety elements
KR101844943B1 (en)2011-11-032018-05-18주식회사 케이티Security Domain Authority Change Control Method of Server, Security Domain Authority Change Method of Smart Card, Security Domain Authority Change Method of User Equipment, Server, Smart Card, and User Equipment
US10438196B2 (en)2011-11-212019-10-08Mozido, Inc.Using a mobile wallet infrastructure to support multiple mobile wallet providers
US9208488B2 (en)2011-11-212015-12-08Mozido, Inc.Using a mobile wallet infrastructure to support multiple mobile wallet providers
GB2497281A (en)*2011-12-012013-06-12Barclays Bank PlcElectronic wallet mobile payment transaction system
WO2013090611A2 (en)2011-12-132013-06-20Visa International Service AssociationDynamic widget generator apparatuses, methods and systems
US9953378B2 (en)2012-04-272018-04-24Visa International Service AssociationSocial checkout widget generation and integration apparatuses, methods and systems
US8984648B2 (en)*2011-12-152015-03-17Blackberry LimitedMethod and device for managing a secure element
US9185089B2 (en)2011-12-202015-11-10Apple Inc.System and method for key management for issuer security domain using global platform specifications
US9032385B2 (en)2011-12-282015-05-12Lg Electronics Inc.Mobile terminal and control method thereof
US9077769B2 (en)*2011-12-292015-07-07Blackberry LimitedCommunications system providing enhanced trusted service manager (TSM) verification features and related methods
US9923986B2 (en)*2011-12-302018-03-20Mozido Corfire—Korea, Ltd.Master TSM
US11308227B2 (en)2012-01-092022-04-19Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
US10262148B2 (en)2012-01-092019-04-16Visa International Service AssociationSecure dynamic page content and layouts apparatuses, methods and systems
CN103246914B (en)*2012-02-072016-05-25慧荣科技股份有限公司Safety digital card
US8385553B1 (en)2012-02-282013-02-26Google Inc.Portable secure element
EP4131113A1 (en)2012-02-292023-02-08Apple Inc.Method, device and secure element for conducting a secured financial transaction on a device
ITMI20120561A1 (en)*2012-04-052013-10-06St Microelectronics Srl METHOD TO PROTECT AN APPLICATION PROGRAM
US8429409B1 (en)2012-04-062013-04-23Google Inc.Secure reset of personal and service provider information on mobile devices
AU2013204110B2 (en)*2012-04-182014-08-21Google LlcProcessing payment transactions without a secure element
US10290013B2 (en)*2012-04-202019-05-14Mastercard International IncorporatedMethods and apparatus for standard approach to coupon selection
TWI494856B (en)*2012-05-212015-08-01Irene Tsai Program call method and mobile device
EP2857964B1 (en)2012-05-312020-09-16Sony CorporationInformation processing device, information processing method, and program
US9569633B2 (en)*2012-06-292017-02-14Intel CorporationDevice, system, and method for processor-based data protection
US8676709B2 (en)2012-07-312014-03-18Google Inc.Merchant category codes in a proxy card transaction
DE102012016164A1 (en)*2012-08-142014-02-20Giesecke & Devrient Gmbh Security element and method for installing data in the security element
KR20150016369A (en)*2012-08-242015-02-11제이브이엘 벤쳐스, 엘엘씨Systems, methods, and computer program products for securing and managing applications on secure elements
JP6072907B2 (en)2012-09-182017-02-01グーグル インコーポレイテッド Systems, methods, and computer program products for interfacing trusted service managers and secure elements of multiple service providers
KR20150072438A (en)*2012-10-152015-06-29파워드 카드 솔루션스, 엘엘씨System and method for secure remote access and remote payment using a mobile device and a powered display card
US10057400B1 (en)2012-11-022018-08-21Majen Tech, LLCLock screen interface for a mobile device apparatus
DE102012022875A1 (en)*2012-11-222014-05-22Giesecke & Devrient Gmbh Method and system for application installation
KR101436872B1 (en)*2012-11-292014-09-02에스케이씨앤씨 주식회사Method and System for Information Management in Secure Element
US9445262B2 (en)*2012-12-102016-09-13Lg Uplus Corp.Authentication server, mobile terminal and method for issuing radio frequency card key using authentication server and mobile terminal
US9147187B1 (en)*2013-01-092015-09-29Sprint Communications Company L.P.Storing and accessing a plurality of payment options on a secure element
US11431834B1 (en)2013-01-102022-08-30Majen Tech, LLCScreen interface for a mobile device apparatus
US10051103B1 (en)2013-01-102018-08-14Majen Tech, LLCScreen interface for a mobile device apparatus
US20140222670A1 (en)*2013-02-012014-08-07Barclays Bank PlcContactless payment application management
JP6101824B2 (en)*2013-02-062017-03-22アップル インコーポレイテッド Apparatus and method for secure element transaction and asset management
US9270336B2 (en)*2013-02-252016-02-23Lexmark International, Inc.Provisioning user attributes for use with mobile computing device
US8909143B2 (en)*2013-02-252014-12-09Lexmark International, Inc.Provisioning user attributes for use with mobile computing device
JP6393988B2 (en)*2013-02-282018-09-26株式会社リコー Apparatus, information processing system, control method, program, and storage medium
EP2956825B1 (en)2013-03-152020-06-24Apple Inc.Facilitating transactions with a user account using a wireless device
US8690054B1 (en)2013-05-292014-04-08The Toronto-Dominion BankSystem and method for chip-enabled card transaction processing and alert communication
EP2809054B1 (en)*2013-05-292018-08-01Legic Identsystems AGMobile electronic device with transceiver for wireless data exchange
KR20140142996A (en)*2013-06-052014-12-15삼성전자주식회사Method for processing data of applet included in a plurity of secure element and apparatus for the same
US20150019417A1 (en)*2013-06-262015-01-15Google Inc.Updating a digital wallet from financial account issuer
EP3020013A4 (en)*2013-07-122017-02-15Google, Inc.Systems, methods, and computer program products for enabling instrument credentials
EP2827275A1 (en)*2013-07-162015-01-21Gemalto SAMethod for transferring user data between two instances of an application
US9287935B2 (en)*2013-08-012016-03-15Blackberry LimitedMethod and apparatus for anti-eavesdropping in vunerable NFC applications
US20150058213A1 (en)*2013-08-212015-02-26Rogers Communications Inc.Preventative security for credential transmission using smart cards
US20150058191A1 (en)*2013-08-262015-02-26Apple Inc.Secure provisioning of credentials on an electronic device
WO2015038551A1 (en)*2013-09-102015-03-19Visa International Service AssociationMobile payment application provisioning and personalization on a mobile device
US9311491B2 (en)*2013-09-302016-04-12Google Inc.Systems, methods, and computer program products for securely managing data on a secure element
WO2015054206A1 (en)*2013-10-102015-04-16Jvl Ventures, LlcSystems, methods, and computer program products for managing communications
TWI516978B (en)*2013-10-312016-01-11萬國商業機器公司Management of security modes applied to execution of applications in a computer device
US10552830B2 (en)*2013-12-232020-02-04Apple Inc.Deletion of credentials from an electronic device
US10445718B2 (en)2013-12-272019-10-15Visa International Service AssociationProcessing a transaction using multiple application identifiers
US9436455B2 (en)2014-01-062016-09-06Apple Inc.Logging operating system updates of a secure element of an electronic device
US9483249B2 (en)*2014-01-062016-11-01Apple Inc.On-board applet migration
US10726472B2 (en)2014-03-312020-07-28Monticello Enterprises LLCSystem and method for providing simplified in-store, product-based and rental payment processes
US11080777B2 (en)2014-03-312021-08-03Monticello Enterprises LLCSystem and method for providing a social media shopping experience
US11282131B2 (en)2014-03-312022-03-22Monticello Enterprises LLCUser device enabling access to payment information in response to user input
US10511580B2 (en)2014-03-312019-12-17Monticello Enterprises LLCSystem and method for providing a social media shopping experience
US9330247B2 (en)*2014-04-182016-05-03The Boeing CompanyApparatus and method for managing multiple user accounts on a memory card
FR3020164B1 (en)*2014-04-182020-10-16Compagnie Ind Et Financiere Dingenierie Ingenico EMULATION MODULE OF AT LEAST ONE PAYMENT CARD, METHOD, PAYMENT DEVICE, COMPUTER PROGRAM PRODUCT AND CORRESPONDING STORAGE MEDIUM
US9537858B2 (en)*2014-05-152017-01-03Apple Inc.Methods and apparatus to support globalplatform™ usage on an embedded UICC (eUICC)
US9424568B2 (en)2014-05-292016-08-23Apple Inc.Financial-transaction notifications
US9400977B2 (en)2014-05-292016-07-26Apple Inc.User device enabling access to payment information in response to mechanical input detection
US11017384B2 (en)2014-05-292021-05-25Apple Inc.Apparatuses and methods for using a primary user device to provision credentials onto a secondary user device
US9299072B2 (en)*2014-05-292016-03-29Apple Inc.Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
CN104010044B (en)*2014-06-122018-02-23北京握奇数据系统有限公司Application based on credible performing environment technology is limited installation method, manager and terminal
CN104023032B (en)*2014-06-232017-11-24北京握奇智能科技有限公司Application based on credible performing environment technology is limited discharging method, server and terminal
US10242356B2 (en)*2014-08-252019-03-26Google LlcHost-formatted select proximity payment system environment response
EP3023925B1 (en)*2014-11-192019-08-28IDEMIA FranceSecure element with applications
US9361140B1 (en)*2014-12-112016-06-07International Business Machines CorporationIsolating applications in server environment
US11250421B2 (en)2015-02-082022-02-15Apple Inc.Storing secure credential information in different regions
US11216468B2 (en)2015-02-082022-01-04Visa International Service AssociationConverged merchant processing apparatuses, methods and systems
US11429975B1 (en)2015-03-272022-08-30Wells Fargo Bank, N.A.Token management system
DE102015004319B4 (en)*2015-04-012024-07-11Giesecke+Devrient Mobile Security Germany Gmbh Procedure for supporting an installation of an application
WO2016168475A1 (en)*2015-04-142016-10-20Capital One Services, LlcSystems and methods for secure firmware validation
EP3082034A1 (en)*2015-04-172016-10-19Gemalto SaMethod for modifying the execution of a platform-independent method of an integrated circuit card
FR3035239B1 (en)*2015-04-172017-03-31Morpho METHOD FOR MANAGING AN ELECTRONIC CARD MEMORY
EP3086272A1 (en)*2015-04-202016-10-26Oberthur TechnologiesSelecting an application on a card
CN105590201B (en)*2015-04-232019-05-10中国银联股份有限公司 Mobile payment device and mobile payment system
US11170364B1 (en)2015-07-312021-11-09Wells Fargo Bank, N.A.Connected payment card systems and methods
US10248940B1 (en)*2015-09-242019-04-02Square, Inc.Modular firmware for transaction system
WO2017106707A1 (en)*2015-12-182017-06-22Cpi Card Group - Colorado, Inc.Improved system and method for providing ic chip cards
JP6947166B2 (en)*2016-03-232021-10-13ソニーグループ株式会社 Information processing device and information processing method
US10026085B2 (en)*2016-03-302018-07-17Ncr CorporationCross-channel security authentication
US10108412B2 (en)2016-03-302018-10-23Square, Inc.Blocking and non-blocking firmware update
EP3236405B1 (en)*2016-04-212022-11-02IDEMIA FranceSelecting an application on a card
DE102016007189A1 (en)*2016-06-142017-12-14Giesecke+Devrient Mobile Security Gmbh Resource Limited Java Card Device
CN106156667B (en)*2016-06-232019-04-16北京小米支付技术有限公司Open card method for writing data, apparatus and system
US11010765B2 (en)2016-06-292021-05-18Square, Inc.Preliminary acquisition of payment information
US10817869B2 (en)2016-06-292020-10-27Square, Inc.Preliminary enablement of transaction processing circuitry
US10417628B2 (en)2016-06-292019-09-17Square, Inc.Multi-interface processing of electronic payment transactions
US11935020B1 (en)2016-07-012024-03-19Wells Fargo Bank, N.A.Control tower for prospective transactions
US11615402B1 (en)2016-07-012023-03-28Wells Fargo Bank, N.A.Access control tower
US11886611B1 (en)2016-07-012024-01-30Wells Fargo Bank, N.A.Control tower for virtual rewards currency
US11386223B1 (en)2016-07-012022-07-12Wells Fargo Bank, N.A.Access control tower
US10992679B1 (en)2016-07-012021-04-27Wells Fargo Bank, N.A.Access control tower
US12130937B1 (en)2016-07-012024-10-29Wells Fargo Bank, N.A.Control tower for prospective transactions
EP3291088A1 (en)*2016-09-022018-03-07Gemalto SaJava card application memory footprint optimization
US11074582B2 (en)*2016-09-232021-07-27Apple Inc.Secure element having multiple users
US10679201B2 (en)2016-11-042020-06-09Nxp B.V.Personal point of sale (pPOS) device that provides for card present E-commerce transaction
US11315114B2 (en)2016-12-282022-04-26Capital One Services, LlcDynamic transaction card protected by multi-factor authentication
US11514418B2 (en)2017-03-192022-11-29Nxp B.V.Personal point of sale (pPOS) device with a local and/or remote payment kernel that provides for card present e-commerce transaction
US11556936B1 (en)2017-04-252023-01-17Wells Fargo Bank, N.A.System and method for card control
US10430769B2 (en)2017-05-052019-10-01Bank Of America CorporationSystem for atypical third party channel utilization for resource distribution completion
US11062388B1 (en)2017-07-062021-07-13Wells Fargo Bank, N.AData control tower
WO2019074572A1 (en)*2017-08-092019-04-18Icrypto, Inc.System and method for securely storing data in a sim
EP3467743A1 (en)*2017-10-032019-04-10Gemalto SaMethod and system for performing a payment transaction via a bank terminal with an electronic device
US11188887B1 (en)2017-11-202021-11-30Wells Fargo Bank, N.A.Systems and methods for payment information access management
US20190172037A1 (en)*2017-12-012019-06-06Qualcomm IncorporatedPrivacy protection in financial transactions conducted on mobile platforms
US10043122B1 (en)*2018-01-192018-08-07Capital One Services, LlcConfiguring a set of applets on a battery-less transaction card
SG11202007704YA (en)2018-04-192020-09-29Mastercard International IncMethods, systems and computer program products for contactless payments
US11620623B2 (en)2018-05-312023-04-04Nxp B.V.Merchant transaction mirroring for personal point of sale (pPOS) for card present e-commerce and in vehicle transaction
US10546444B2 (en)2018-06-212020-01-28Capital One Services, LlcSystems and methods for secure read-only authentication
US10769299B2 (en)2018-07-122020-09-08Capital One Services, LlcSystem and method for dynamic generation of URL by smart card
WO2020041722A1 (en)*2018-08-242020-02-27Mastercard International IncorporatedSystems and methods for secure remote commerce
US11216806B2 (en)2018-09-192022-01-04Capital One Services, LlcSystems and methods for providing card interactions
WO2020072413A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10949520B2 (en)2018-10-022021-03-16Capital One Services, LlcSystems and methods for cross coupling risk analytics and one-time-passcodes
KR20250121453A (en)2018-10-022025-08-12캐피탈 원 서비시즈, 엘엘씨Systems and methods for cryptographic authentication of contactless cards
US10542036B1 (en)2018-10-022020-01-21Capital One Services, LlcSystems and methods for signaling an attack on contactless cards
US10607214B1 (en)2018-10-022020-03-31Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10554411B1 (en)2018-10-022020-02-04Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
KR20210065109A (en)2018-10-022021-06-03캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
WO2020072583A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for establishing identity for order pick up
US10582386B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072537A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072552A1 (en)2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10841091B2 (en)2018-10-022020-11-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10748138B2 (en)2018-10-022020-08-18Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
KR20210065961A (en)*2018-10-022021-06-04캐피탈 원 서비시즈, 엘엘씨 System and method for cryptographic authentication of contactless card
US10581611B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10565587B1 (en)2018-10-022020-02-18Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10505738B1 (en)2018-10-022019-12-10Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10909527B2 (en)2018-10-022021-02-02Capital One Services, LlcSystems and methods for performing a reissue of a contactless card
US10771254B2 (en)2018-10-022020-09-08Capital One Services, LlcSystems and methods for email-based card activation
US10685350B2 (en)2018-10-022020-06-16Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US11210664B2 (en)2018-10-022021-12-28Capital One Services, LlcSystems and methods for amplifying the strength of cryptographic algorithms
US10511443B1 (en)2018-10-022019-12-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10992477B2 (en)2018-10-022021-04-27Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10771253B2 (en)2018-10-022020-09-08Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10783519B2 (en)2018-10-022020-09-22Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10489781B1 (en)2018-10-022019-11-26Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
AU2019355436A1 (en)2018-10-022021-04-15Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US10579998B1 (en)2018-10-022020-03-03Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US11641406B2 (en)*2018-10-172023-05-02Servicenow, Inc.Identifying applications with machine learning
EP3668037A1 (en)*2018-12-112020-06-17Thales Dis France SAMethod to manage multiple virtual documents in a contactless secure element
US10664830B1 (en)2018-12-182020-05-26Capital One Services, LlcDevices and methods for selective contactless communication
US11049095B2 (en)2018-12-212021-06-29Square, Inc.Point of sale (POS) systems and methods with dynamic kernel selection
US10990969B2 (en)2018-12-212021-04-27Square, Inc.Point of sale (POS) systems and methods for dynamically processing payment data based on payment reader capability
US10762196B2 (en)2018-12-212020-09-01Square, Inc.Point of sale (POS) systems and methods with dynamic kernel selection
US11037123B2 (en)*2019-01-072021-06-15Visa International Service AssociationSystem, method, and computer program product for customizing functions of a point-of-sale terminal
US20200226581A1 (en)2019-01-112020-07-16Capital One Services, LlcSystems and methods for touch screen interface interaction using a card overlay
US11037136B2 (en)2019-01-242021-06-15Capital One Services, LlcTap to autofill card data
US10791460B2 (en)*2019-01-302020-09-29Visa International Service AssociationTerminal type identification in interaction processing
US10467622B1 (en)2019-02-012019-11-05Capital One Services, LlcUsing on-demand applications to generate virtual numbers for a contactless card to securely autofill forms
US11120453B2 (en)2019-02-012021-09-14Capital One Services, LlcTap card to securely generate card data to copy to clipboard
US10510074B1 (en)2019-02-012019-12-17Capital One Services, LlcOne-tap payment using a contactless card
US10425129B1 (en)2019-02-272019-09-24Capital One Services, LlcTechniques to reduce power consumption in near field communication systems
CN110020569B (en)*2019-03-112022-03-29华为技术有限公司Method for automatically selecting NFC analog card, electronic equipment and communication system
US10523708B1 (en)2019-03-182019-12-31Capital One Services, LlcSystem and method for second factor authentication of customer support calls
US10984416B2 (en)2019-03-202021-04-20Capital One Services, LlcNFC mobile currency transfer
US10535062B1 (en)2019-03-202020-01-14Capital One Services, LlcUsing a contactless card to securely share personal data stored in a blockchain
US10438437B1 (en)2019-03-202019-10-08Capital One Services, LlcTap to copy data to clipboard via NFC
US10643420B1 (en)2019-03-202020-05-05Capital One Services, LlcContextual tapping engine
US10970712B2 (en)2019-03-212021-04-06Capital One Services, LlcDelegated administration of permissions using a contactless card
US11227280B2 (en)2019-03-252022-01-18Capital One Services, LlcSystems and methods for increased efficiency and reliability of contactless card transactions
WO2020191462A1 (en)*2019-03-272020-10-01Xard Group Pty LtdDisabling payment scheme on a digital transaction processing unit (dtpu)
US10467445B1 (en)2019-03-282019-11-05Capital One Services, LlcDevices and methods for contactless card alignment with a foldable mobile device
CN110166452B (en)*2019-05-212022-03-04东信和平科技股份有限公司Access control method and system based on JavaCard shared interface
US11521262B2 (en)2019-05-282022-12-06Capital One Services, LlcNFC enhanced augmented reality information overlays
US10516447B1 (en)2019-06-172019-12-24Capital One Services, LlcDynamic power levels in NFC card communications
US11694187B2 (en)2019-07-032023-07-04Capital One Services, LlcConstraining transactional capabilities for contactless cards
US11392933B2 (en)2019-07-032022-07-19Capital One Services, LlcSystems and methods for providing online and hybridcard interactions
US10871958B1 (en)2019-07-032020-12-22Capital One Services, LlcTechniques to perform applet programming
US12086852B2 (en)2019-07-082024-09-10Capital One Services, LlcAuthenticating voice transactions with payment card
US10713649B1 (en)2019-07-092020-07-14Capital One Services, LlcSystem and method enabling mobile near-field communication to update display on a payment card
US10885514B1 (en)2019-07-152021-01-05Capital One Services, LlcSystem and method for using image data to trigger contactless card transactions
US10498401B1 (en)2019-07-152019-12-03Capital One Services, LlcSystem and method for guiding card positioning using phone sensors
US10832271B1 (en)2019-07-172020-11-10Capital One Services, LlcVerified reviews using a contactless card
US10733601B1 (en)2019-07-172020-08-04Capital One Services, LlcBody area network facilitated authentication or payment authorization
WO2021011752A1 (en)*2019-07-172021-01-21Visa International Service AssociationDynamic application selection based on contextual data
US11182771B2 (en)2019-07-172021-11-23Capital One Services, LlcSystem for value loading onto in-vehicle device
US11521213B2 (en)2019-07-182022-12-06Capital One Services, LlcContinuous authentication for digital services based on contactless card positioning
US10506426B1 (en)2019-07-192019-12-10Capital One Services, LlcTechniques for call authentication
US10541995B1 (en)2019-07-232020-01-21Capital One Services, LlcFirst factor contactless card authentication system and method
US11556918B2 (en)*2019-09-192023-01-17Mastercard International IncorporatedSimulated contactless payment cards providing multiple temporary profiles and corresponding credentials
WO2021055665A1 (en)*2019-09-192021-03-25Mastercard International IncorporatedApplication management for simulated contactless payment cards
CN112631616B (en)*2019-09-242025-03-04中国移动通信有限公司研究院 eSIM card, card application processing, setting method, terminal and platform equipment
CA3153291A1 (en)2019-10-022021-04-08Evan LernerClient device authentication using contactless legacy magnetic stripe data
US10733283B1 (en)2019-12-232020-08-04Capital One Services, LlcSecure password generation and management using NFC and contactless smart cards
US10862540B1 (en)2019-12-232020-12-08Capital One Services, LlcMethod for mapping NFC field strength and location on mobile devices
US10885410B1 (en)2019-12-232021-01-05Capital One Services, LlcGenerating barcodes utilizing cryptographic techniques
US11615395B2 (en)2019-12-232023-03-28Capital One Services, LlcAuthentication for third party digital wallet provisioning
US11113685B2 (en)2019-12-232021-09-07Capital One Services, LlcCard issuing with restricted virtual numbers
US11651361B2 (en)2019-12-232023-05-16Capital One Services, LlcSecure authentication based on passport data stored in a contactless card
US10657754B1 (en)2019-12-232020-05-19Capital One Services, LlcContactless card and personal identification system
US11200563B2 (en)2019-12-242021-12-14Capital One Services, LlcAccount registration using a contactless card
US10853795B1 (en)2019-12-242020-12-01Capital One Services, LlcSecure authentication based on identity data stored in a contactless card
US10664941B1 (en)2019-12-242020-05-26Capital One Services, LlcSteganographic image encoding of biometric template information on a card
US10909544B1 (en)2019-12-262021-02-02Capital One Services, LlcAccessing and utilizing multiple loyalty point accounts
US10757574B1 (en)2019-12-262020-08-25Capital One Services, LlcMulti-factor authentication providing a credential via a contactless card for secure messaging
US11038688B1 (en)2019-12-302021-06-15Capital One Services, LlcTechniques to control applets for contactless cards
US11455620B2 (en)2019-12-312022-09-27Capital One Services, LlcTapping a contactless card to a computing device to provision a virtual number
US10860914B1 (en)2019-12-312020-12-08Capital One Services, LlcContactless card and method of assembly
US11210656B2 (en)2020-04-132021-12-28Capital One Services, LlcDetermining specific terms for contactless card activation
US11222342B2 (en)*2020-04-302022-01-11Capital One Services, LlcAccurate images in graphical user interfaces to enable data transfer
US11030339B1 (en)2020-04-302021-06-08Capital One Services, LlcSystems and methods for data access control of personal user data using a short-range transceiver
US10915888B1 (en)2020-04-302021-02-09Capital One Services, LlcContactless card with multiple rotating security keys
US10861006B1 (en)2020-04-302020-12-08Capital One Services, LlcSystems and methods for data access control using a short-range transceiver
US11823175B2 (en)2020-04-302023-11-21Capital One Services, LlcIntelligent card unlock
US10963865B1 (en)2020-05-122021-03-30Capital One Services, LlcAugmented reality card activation experience
US11100511B1 (en)2020-05-182021-08-24Capital One Services, LlcApplication-based point of sale system in mobile operating systems
US11063979B1 (en)2020-05-182021-07-13Capital One Services, LlcEnabling communications between applications in a mobile operating system
US11538019B1 (en)*2020-06-052022-12-27American Express Travel Related Services Company, Inc.Zero-knowledge proof-based virtual cards
US11216623B1 (en)2020-08-052022-01-04Capital One Services, LlcSystems and methods for controlling secured data transfer via URLs
US11062098B1 (en)2020-08-112021-07-13Capital One Services, LlcAugmented reality information display and interaction via NFC based authentication
US11683325B2 (en)2020-08-112023-06-20Capital One Services, LlcSystems and methods for verified messaging via short-range transceiver
US12165149B2 (en)2020-08-122024-12-10Capital One Services, LlcSystems and methods for user verification via short-range transceiver
US10992606B1 (en)2020-09-042021-04-27Wells Fargo Bank, N.A.Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
US11482312B2 (en)2020-10-302022-10-25Capital One Services, LlcSecure verification of medical status using a contactless card
US11165586B1 (en)2020-10-302021-11-02Capital One Services, LlcCall center web-based authentication using a contactless card
US11373169B2 (en)2020-11-032022-06-28Capital One Services, LlcWeb-based activation of contactless cards
US11216799B1 (en)2021-01-042022-01-04Capital One Services, LlcSecure generation of one-time passcodes using a contactless card
US11546338B1 (en)2021-01-052023-01-03Wells Fargo Bank, N.A.Digital account controls portal and protocols for federated and non-federated systems and devices
US11682012B2 (en)2021-01-272023-06-20Capital One Services, LlcContactless delivery systems and methods
US11792001B2 (en)2021-01-282023-10-17Capital One Services, LlcSystems and methods for secure reprovisioning
US11687930B2 (en)2021-01-282023-06-27Capital One Services, LlcSystems and methods for authentication of access tokens
US11562358B2 (en)2021-01-282023-01-24Capital One Services, LlcSystems and methods for near field contactless card communication and cryptographic authentication
US11438329B2 (en)2021-01-292022-09-06Capital One Services, LlcSystems and methods for authenticated peer-to-peer data transfer using resource locators
US11777933B2 (en)2021-02-032023-10-03Capital One Services, LlcURL-based authentication for payment cards
CN113508411A (en)2021-02-052021-10-15深圳市汇顶科技股份有限公司Virtual electronic card management method and system, security chip, terminal and storage medium
US11637826B2 (en)2021-02-242023-04-25Capital One Services, LlcEstablishing authentication persistence
US12143515B2 (en)2021-03-262024-11-12Capital One Services, LlcSystems and methods for transaction card-based authentication
US11245438B1 (en)2021-03-262022-02-08Capital One Services, LlcNetwork-enabled smart apparatus and systems and methods for activating and provisioning same
US12160419B2 (en)2021-04-152024-12-03Capital One Services, LlcAuthenticated messaging session with contactless card authentication
US11961089B2 (en)2021-04-202024-04-16Capital One Services, LlcOn-demand applications to extend web services
US11935035B2 (en)2021-04-202024-03-19Capital One Services, LlcTechniques to utilize resource locators by a contactless card to perform a sequence of operations
US11902442B2 (en)2021-04-222024-02-13Capital One Services, LlcSecure management of accounts on display devices using a contactless card
US11354555B1 (en)2021-05-042022-06-07Capital One Services, LlcMethods, mediums, and systems for applying a display to a transaction card
US12301735B2 (en)2021-06-182025-05-13Capital One Services, LlcSystems and methods for contactless card communication and multi-device key pair cryptographic authentication
US12335412B2 (en)2021-06-212025-06-17Capital One Services, LlcSystems and methods for scalable cryptographic authentication of contactless cards
US12041172B2 (en)2021-06-252024-07-16Capital One Services, LlcCryptographic authentication to control access to storage devices
RU2766323C1 (en)*2021-07-052022-03-15АО "Актив-софт"System and method for interaction of smart cards with ipados devices
US12061682B2 (en)2021-07-192024-08-13Capital One Services, LlcSystem and method to perform digital authentication using multiple channels of communication
US12062258B2 (en)2021-09-162024-08-13Capital One Services, LlcUse of a payment card to unlock a lock
DE102021004912A1 (en)2021-09-292023-03-30Giesecke+Devrient Mobile Security Gmbh UNIVERSAL INTEGRATED CHIP CARD, UICC, FOR MANAGING PROFILES, AND PROCEDURES
DE102021006083A1 (en)2021-12-092023-06-15Giesecke+Devrient Mobile Security Gmbh Secure element with access rule application ARA
US12069173B2 (en)2021-12-152024-08-20Capital One Services, LlcKey recovery based on contactless card authentication
CN114492691B (en)*2022-01-262024-09-17中国银联股份有限公司Hardware calling method and device for IC card application and intelligent IC card
US12166750B2 (en)2022-02-082024-12-10Capital One Services, LlcSystems and methods for secure access of storage
US12155641B1 (en)2022-04-152024-11-26Wells Fargo Bank, N.A.Network access tokens and meta-application programming interfaces for enhanced inter-enterprise system data promulgation and profiling
DE102022002247B4 (en)*2022-06-212024-12-12Giesecke+Devrient ePayments GmbH Shared contexts for applets loaded onto a disk
US12354077B2 (en)2022-06-232025-07-08Capital One Services, LlcMobile web browser authentication and checkout using a contactless card
US12354104B2 (en)2022-08-092025-07-08Capital One Services, LlcMethods and arrangements for proof of purchase
US12289396B2 (en)2022-08-182025-04-29Capital One Services, LlcParallel secret salt generation and authentication for encrypted communication
US12147983B2 (en)2023-01-132024-11-19Capital One Services, LlcSystems and methods for multi-factor authentication using device tracking and identity verification
US12248832B2 (en)2023-03-072025-03-11Capital One Services, LlcSystems and methods for steganographic image encoding and identity verification using same
US12335256B2 (en)2023-03-082025-06-17Capital One Services, LlcSystems and methods for device binding authentication
US12248928B2 (en)2023-03-132025-03-11Capital One Services, LlcSystems and methods of secure merchant payment over messaging platform using a contactless card
US12124903B2 (en)2023-03-162024-10-22Capital One Services, LlcCard with a time-sensitive element and systems and methods for implementing the same
US12299672B2 (en)2023-03-302025-05-13Capital One Services, LlcSystem and method for authentication with transaction cards
US12200135B2 (en)2023-06-132025-01-14Capital One Services, LlcContactless card-based authentication via web-browser

Citations (137)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4851653A (en)1986-11-071989-07-25Thomson Composants Militaires & SpaciauxIntegrated circuit for memorizing and processing information confidentially, including an anti-fraud device
US5221838A (en)1990-12-241993-06-22Motorola, Inc.Electronic wallet
US5321242A (en)1991-12-091994-06-14Brinks, IncorporatedApparatus and method for controlled access to a secured location
US5787173A (en)1993-05-281998-07-28Tecsec IncorporatedCryptographic key management method and apparatus
WO1998052158A2 (en)1997-05-151998-11-19Mondex International LimitedIntegrated circuit card with application history list
US5872849A (en)1994-01-131999-02-16Certco LlcEnhanced cryptographic system and method with key escrow feature
US5991399A (en)1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6005942A (en)1997-03-241999-12-21Visa International Service AssociationSystem and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6041123A (en)1996-07-012000-03-21Allsoft Distributing IncorporatedCentralized secure communications system
EP1004992A2 (en)1997-03-242000-05-31Visa International Service AssociationA system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6092201A (en)1997-10-242000-07-18Entrust TechnologiesMethod and apparatus for extending secure communication operations via a shared list
US6101477A (en)1998-01-232000-08-08American Express Travel Related Services Company, Inc.Methods and apparatus for a travel-related multi-function smartcard
US6141752A (en)1998-05-052000-10-31Liberate TechnologiesMechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices
US6151657A (en)*1996-10-282000-11-21Macronix International Co., Ltd.Processor with embedded in-circuit programming structures
DE19925389A1 (en)1999-06-022000-12-21Beta Res GmbhTransferring data onto smart cards involves transmitting encrypted data to card, decrypting in card using different keys, encrypting and decrypting data on basis of specific information in smart card
US6230267B1 (en)1997-05-152001-05-08Mondex International LimitedIC card transportation key set
US20010011250A1 (en)1997-11-122001-08-02Cris T. PaltengheDistributed network based electronic wallet
US20010021927A1 (en)2000-03-072001-09-13Christophe LaurentElectronic wallet system
US20010027441A1 (en)2000-02-162001-10-04Mastercard International Incorporated.System and method for conducting electronic commerce with a remote wallet server
US20010039657A1 (en)2000-04-282001-11-08Tvmentor, Inc.Methods, systems and devices for selectively presenting and sorting data content
US20020004783A1 (en)1997-11-122002-01-10Cris T. PaltengheVirtual wallet system
US20020042776A1 (en)2000-09-192002-04-11Woo Kevin K.M.System and method for unifying electronic payment mechanisms
US20020068554A1 (en)1999-04-092002-06-06Steve DusseMethod and system facilitating web based provisioning of two-way mobile communications devices
US6402028B1 (en)1999-04-062002-06-11Visa International Service AssociationIntegrated production of smart cards
US6434238B1 (en)1994-01-112002-08-13Infospace, Inc.Multi-purpose transaction card system
US6484174B1 (en)1998-04-202002-11-19Sun Microsystems, Inc.Method and apparatus for session management and user authentication
US20020194138A1 (en)2000-04-242002-12-19Visa International Service Association A Delaware CorporationOnline account authentication service
US20030023954A1 (en)1996-10-252003-01-30Wilkinson Timothy J.Using a high level programming language with a microcontroller
US20030074579A1 (en)2001-10-162003-04-17Microsoft CorporationVirtual distributed security system
EP1318488A2 (en)2001-12-062003-06-11Matsushita Electric Industrial Co., Ltd.IC card with capability of having plurality of card managers installed
US20030140176A1 (en)1999-01-222003-07-24Joshua SusserTechniques for permitting access across a context barrier on a small footprint device using an entry point object
US6601761B1 (en)1998-09-152003-08-05Citibank, N.A.Method and system for co-branding an electronic payment platform such as an electronic wallet
US6609113B1 (en)1999-05-032003-08-19The Chase Manhattan BankMethod and system for processing internet payments using the electronic funds transfer network
US20040030601A1 (en)2000-09-292004-02-12Pond Russell L.Electronic payment methods for a mobile device
US20040029569A1 (en)2001-12-262004-02-12Vivotech, Inc.Micropayment financial transaction process utilizing wireless network processing
US20040123152A1 (en)2002-12-182004-06-24Eric Le SaintUniform framework for security tokens
US20040128259A1 (en)2002-12-312004-07-01Blakeley Douglas BurnetteMethod for ensuring privacy in electronic transactions with session key blocks
US20040140351A1 (en)2002-12-112004-07-22Scheidt & Bachmann GmbhMethods and systems for user media interoperability
US6792536B1 (en)1999-10-202004-09-14Timecertain LlcSmart card system and methods for proving dates in digital files
US6823520B1 (en)1999-01-222004-11-23Sun Microsystems, Inc.Techniques for implementing security on a small footprint device using a context barrier
US20050001711A1 (en)*2000-11-062005-01-06Innovation Connection CorporationSystem, method and apparatus for electronic ticketing
US20050071418A1 (en)2003-09-172005-03-31Openwave Systems Inc.Federated download of digital content to wireless devices
US20050102679A1 (en)1999-01-222005-05-12Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using global data structures
US20050149926A1 (en)2003-12-222005-07-07Sun Microsystems, Inc.Framework for providing a configurable firewall for computing systems
US6922835B1 (en)1999-01-222005-07-26Sun Microsystems, Inc.Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges
US20050188360A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for providing an application on a smart card
US20050184165A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and appatatus for selecting a desired application on a smart card
US20050184164A1 (en)2004-02-242005-08-25Sun Microsystems, Inc. A Delaware CorporationMethod and apparatus for installing an application onto a smart card
US20050184163A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for processing an application identifier from a smart card
US20050222961A1 (en)2004-04-052005-10-06Philippe StaibSystem and method of facilitating contactless payment transactions across different payment systems using a common mobile device acting as a stored value device
US6963270B1 (en)1999-10-272005-11-08Checkpoint Systems, Inc.Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system
US20060036570A1 (en)2004-08-032006-02-16Softricity, Inc.System and method for controlling inter-application association through contextual policy control
US20060041507A1 (en)2004-08-132006-02-23Sbc Knowledge Ventures L.P.Pluggable authentication for transaction tool management services
US20060126831A1 (en)2004-12-142006-06-15Cerruti Julian ASystems, methods, and media for adding an additional level of indirection to title key encryption
US20060165060A1 (en)2005-01-212006-07-27Robin DuaMethod and apparatus for managing credentials through a wireless network
US7093122B1 (en)1999-01-222006-08-15Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces
US20060219774A1 (en)2005-03-302006-10-05Benco David SNetwork support for credit card receipt reconciliation
US7152782B2 (en)2003-07-112006-12-26Visa International Service AssociationSystem and method for managing electronic data transfer applications
US7159180B2 (en)2001-12-142007-01-02America Online, Inc.Proxy platform integration system
US20070067325A1 (en)*2005-02-142007-03-22Xsapio, Ltd.Methods and apparatus to load and run software programs in data collection devices
US20070090195A1 (en)2004-04-082007-04-26Hiromi KawamuraSemiconductor memory
US20070135164A1 (en)2002-12-072007-06-14Healthpia Co., Ltd.Mobile communication terminal having ic card settlement function
US7232073B1 (en)2004-12-212007-06-19Sun Microsystems, Inc.Smart card with multiple applications
US7243853B1 (en)2001-12-042007-07-17Visa U.S.A. Inc.Method and system for facilitating memory and application management on a secured token
US20070169043A1 (en)2006-01-092007-07-19Sun Microsystems, Inc.Supporting applets on a high end platform
US20070226786A1 (en)2006-03-212007-09-27International Business Machines CorporationMethod and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
US7275685B2 (en)2004-04-122007-10-02Rearden Capital CorporationMethod for electronic payment
US20080056501A1 (en)2006-09-062008-03-06Sslnext Inc.Method and system for providing authentication service for Internet users
US7346170B2 (en)2000-12-262008-03-18Sony CorporationInformation processing system and method
US7349885B2 (en)1998-05-292008-03-25E-Micro CorporationWallet consolidator and related methods of processing a transaction using a wallet consolidator
US20080073426A1 (en)2006-09-242008-03-27Rfcyber Corp.Method and apparatus for providing electronic purse
US7353396B2 (en)1995-10-022008-04-01Corestreet, Ltd.Physical access control
US7360691B2 (en)2004-02-022008-04-22Matsushita Electric Industrial Co., Ltd.Secure device and mobile terminal which carry out data exchange between card applications
US7382762B2 (en)2003-07-082008-06-03Samsung Electronics Co., Ltd.Method and system for distributed certificate management in ad-hoc networks
US20080130902A1 (en)2006-04-102008-06-05Honeywell International Inc.Secure wireless instrumentation network system
US7392378B1 (en)2003-03-192008-06-24Verizon Corporate Services Group Inc.Method and apparatus for routing data traffic in a cryptographically-protected network
US20080162834A1 (en)2003-09-252008-07-03Daniel Alan BrokenshireTask Queue Management of Virtual Devices Using a Plurality of Processors
US20080167988A1 (en)2007-01-052008-07-10Macronix International Co., Ltd.System and Method of Managing Contactless Payment Transactions Using a Mobile Communication Device As A Stored Value Device
US20080208681A1 (en)2006-09-282008-08-28Ayman HammadPayment using a mobile device
US20080208762A1 (en)2007-02-222008-08-28First Data CorporationPayments using a mobile commerce device
US20080270253A1 (en)2005-02-142008-10-30Smarttrust AbMethod for Performing an Electronic Transaction
US7469151B2 (en)2006-09-012008-12-23Vivotech, Inc.Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities
US7502946B2 (en)2005-01-202009-03-10Panasonic CorporationUsing hardware to secure areas of long term storage in CE devices
EP2043060A1 (en)2007-09-272009-04-01Nxp B.V.Trusted service manager managing reports of lost or stolen mobile communication devices
US20090158028A1 (en)2007-12-172009-06-18Electronics And Telecommunications Research InstituteDrm method and drm system using trusted platform module
GB2457221A (en)2007-10-172009-08-12Vodafone PlcSmart Card Web Server (SCWS) administration within a plurality of security domains
US20090239512A1 (en)2006-12-042009-09-24Ayman HammadMobile phone containing contactless payment card used in transit fare collection
US20090261172A1 (en)2008-04-182009-10-22Pradeep KumarSystems, methods, and computer program products for supporting multiple contactless applications using different security keys
US7631346B2 (en)2005-04-012009-12-08International Business Machines CorporationMethod and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
US20090307142A1 (en)2008-06-062009-12-10Upendra MardikarTrusted service manager (tsm) architectures and methods
US7631810B2 (en)2006-12-192009-12-15Vivotech, Inc.Systems, methods, and computer program products for supporting multiple applications and multiple instances of the same application on a wireless smart device
US20090312011A1 (en)2006-12-152009-12-17Innovision Research & Technology PlcCommunications devices comprising near field rf communicators
US7650505B1 (en)2005-06-172010-01-19Sun Microsystems, Inc.Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies
US20100012732A1 (en)2007-01-242010-01-21Giesecke & Devrient GmbhInstalling a patch in a smart card module
US20100042824A1 (en)2008-08-142010-02-18The Trustees Of Princeton UniversityHardware trust anchors in sp-enabled processors
US20100050271A1 (en)2007-01-312010-02-25Nokia CorporationManaging applications related to secure modules
US20100058463A1 (en)2008-08-282010-03-04Oberthur TechnologiesMethod of exchanging data between two electronic entities
US20100063893A1 (en)2008-09-112010-03-11Palm, Inc.Method of and system for secure on-line purchases
US20100088237A1 (en)2008-10-042010-04-08Wankmueller John RMethods and systems for using physical payment cards in secure e-commerce transactions
US20100114731A1 (en)2008-10-302010-05-06Kingston Tamara SELECTRONIC WALLET ("eWallet")
US20100131413A1 (en)2008-08-062010-05-27Kranzley Arthur DMethods and systems to securely loard / reload a contactless payment device
US20100138518A1 (en)2008-11-242010-06-03MfoundryMethod and system for downloading information into a secure element of an electronic device
US7739731B2 (en)2006-01-092010-06-15Oracle America, Inc.Method and apparatus for protection domain based security
US20100205432A1 (en)2007-09-272010-08-12Nxp B.V.Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications
US20100203870A1 (en)2008-01-042010-08-12Logomotion, S.R.O.Systems and methods for contactless payment authorization
US20100211507A1 (en)2008-09-222010-08-19Christian AabyeOver the air update of payment transaction data stored in secure memory
US20100207742A1 (en)2009-01-262010-08-19Motorola, Inc.Wireless Communication Device for Providing at Least One Near Field Communication Service
US20100250956A1 (en)2002-10-072010-09-30Visa International Service AssociationMethod and system for facilitating data access and management on a secure token
US20100291896A1 (en)2007-07-242010-11-18Nxp B.V.Method, system and trusted service manager for securely transmitting an application to a mobile phone
US20100291904A1 (en)2009-05-132010-11-18First Data CorporationSystems and methods for providing trusted service management services
US20100306076A1 (en)2009-05-292010-12-02Ebay Inc.Trusted Integrity Manager (TIM)
US20100306531A1 (en)2009-05-292010-12-02Ebay Inc.Hardware-Based Zero-Knowledge Strong Authentication (H0KSA)
US20100306107A1 (en)2009-05-292010-12-02Ebay Inc.Trusted remote attestation agent (traa)
US20100323681A1 (en)2007-11-062010-12-23Gemalto S/ASharing or reselling nfc applications among mobile communication devices
US7860486B2 (en)2004-10-222010-12-28Broadcom CorporationKey revocation in a mobile device
US20100330958A1 (en)2007-08-012010-12-30Nxp B.V.Mobile communication device and method for disabling applications
US20110016275A1 (en)2008-03-042011-01-20Nxp B.V.Mobile communication device and method for implementing mifare memory multiple sectors mechanisms
US20110029671A1 (en)2008-04-102011-02-03Jean-Francois DeprunTerminal and method for managing secure devices
US20110053504A1 (en)2008-05-192011-03-03Nxp B.V.Nfc mobile communication device and nfc reader
US20110072425A1 (en)2008-01-162011-03-24Gemalto SaMethod for installing and managing nfc applications with pictures
US20110078081A1 (en)2009-09-302011-03-31Kiushan PirzadehMobile payment application architecture
US20110087610A1 (en)2009-10-132011-04-14Asif BatadaGlobal secure service provider directory
US20110113473A1 (en)2008-06-242011-05-12Nxp B.V.Method of accessing applications in a secure mobile environment
US20110131421A1 (en)2009-12-022011-06-02Fabrice Jogand-CoulombMethod for installing an application on a sim card
US7958544B2 (en)2006-07-212011-06-07Google Inc.Device authentication
US8032743B2 (en)1996-12-132011-10-04Certco, LlcReliance server for electronic transaction system
US20110320291A1 (en)2010-06-282011-12-29Coon Jonathan CSystems and methods for asynchronous mobile authorization of credit card purchases
US20120009873A1 (en)2009-03-102012-01-12Nxp B.V.Method for transmitting an nfc application and computer device
US8126806B1 (en)2007-12-032012-02-28Sprint Communications Company L.P.Method for launching an electronic wallet
US20120129452A1 (en)2006-09-242012-05-24Rfcyber Corp.Method and apparatus for provisioning applications in mobile devices
US8255687B1 (en)2011-09-152012-08-28Google Inc.Enabling users to select between secure service providers using a key escrow service
US8297520B1 (en)2011-09-162012-10-30Google Inc.Secure application directory
US8312284B1 (en)2009-11-062012-11-13Google Inc.Verifiable timestamping of data objects, and applications thereof
US8335921B2 (en)2010-12-172012-12-18Google, Inc.Writing application data to a secure element
US8335932B2 (en)2010-12-172012-12-18Google Inc.Local trusted services manager for a contactless smart card
US8379863B1 (en)2011-09-152013-02-19Google Inc.Enabling users to select between secure service providers using a central trusted service manager
US8385553B1 (en)2012-02-282013-02-26Google Inc.Portable secure element

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP1214696A1 (en)1999-09-222002-06-19Trintech LimitedA method for the secure transfer of payments
US8120460B1 (en)2009-01-052012-02-21Sprint Communications Company L.P.Electronic key provisioning
US8171137B1 (en)2011-05-092012-05-01Google Inc.Transferring application state across devices

Patent Citations (157)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4851653A (en)1986-11-071989-07-25Thomson Composants Militaires & SpaciauxIntegrated circuit for memorizing and processing information confidentially, including an anti-fraud device
US5221838A (en)1990-12-241993-06-22Motorola, Inc.Electronic wallet
US5321242A (en)1991-12-091994-06-14Brinks, IncorporatedApparatus and method for controlled access to a secured location
US5787173A (en)1993-05-281998-07-28Tecsec IncorporatedCryptographic key management method and apparatus
US6434238B1 (en)1994-01-112002-08-13Infospace, Inc.Multi-purpose transaction card system
US5872849A (en)1994-01-131999-02-16Certco LlcEnhanced cryptographic system and method with key escrow feature
US7353396B2 (en)1995-10-022008-04-01Corestreet, Ltd.Physical access control
US6041123A (en)1996-07-012000-03-21Allsoft Distributing IncorporatedCentralized secure communications system
US20030023954A1 (en)1996-10-252003-01-30Wilkinson Timothy J.Using a high level programming language with a microcontroller
US6151657A (en)*1996-10-282000-11-21Macronix International Co., Ltd.Processor with embedded in-circuit programming structures
US8032743B2 (en)1996-12-132011-10-04Certco, LlcReliance server for electronic transaction system
EP1004992A2 (en)1997-03-242000-05-31Visa International Service AssociationA system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6005942A (en)1997-03-241999-12-21Visa International Service AssociationSystem and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6233683B1 (en)1997-03-242001-05-15Visa International Service AssociationSystem and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6230267B1 (en)1997-05-152001-05-08Mondex International LimitedIC card transportation key set
WO1998052158A2 (en)1997-05-151998-11-19Mondex International LimitedIntegrated circuit card with application history list
US6092201A (en)1997-10-242000-07-18Entrust TechnologiesMethod and apparatus for extending secure communication operations via a shared list
US20020004783A1 (en)1997-11-122002-01-10Cris T. PaltengheVirtual wallet system
US20010011250A1 (en)1997-11-122001-08-02Cris T. PaltengheDistributed network based electronic wallet
US5991399A (en)1997-12-181999-11-23Intel CorporationMethod for securely distributing a conditional use private key to a trusted entity on a remote system
US6101477A (en)1998-01-232000-08-08American Express Travel Related Services Company, Inc.Methods and apparatus for a travel-related multi-function smartcard
US6484174B1 (en)1998-04-202002-11-19Sun Microsystems, Inc.Method and apparatus for session management and user authentication
US6141752A (en)1998-05-052000-10-31Liberate TechnologiesMechanism for facilitating secure storage and retrieval of information on a smart card by an internet service provider using various network computer client devices
US7712658B2 (en)1998-05-292010-05-11E-Micro CorporationWallet consolidator and related methods of processing a transaction using a wallet consolidator
US7708198B2 (en)1998-05-292010-05-04E-Micro CorporationWallet consolidator to facilitate a transaction
US7349885B2 (en)1998-05-292008-03-25E-Micro CorporationWallet consolidator and related methods of processing a transaction using a wallet consolidator
US6601761B1 (en)1998-09-152003-08-05Citibank, N.A.Method and system for co-branding an electronic payment platform such as an electronic wallet
US20030140176A1 (en)1999-01-222003-07-24Joshua SusserTechniques for permitting access across a context barrier on a small footprint device using an entry point object
US7395535B2 (en)1999-01-222008-07-01Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using global data structures
US7093122B1 (en)1999-01-222006-08-15Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces
US20050193218A1 (en)*1999-01-222005-09-01Joshua SusserTechniques for permitting access across a context barrier on a small footprint device using an entry point object
US7478389B2 (en)1999-01-222009-01-13Sun Microsystems, Inc.Techniques for implementing security on a small footprint device using a context barrier
US7607175B2 (en)1999-01-222009-10-20Sun Microsystems, Inc.Techniques for permitting access across a context barrier on a small footprint device using an entry point object
US6922835B1 (en)1999-01-222005-07-26Sun Microsystems, Inc.Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges
US6633984B2 (en)1999-01-222003-10-14Sun Microsystems, Inc.Techniques for permitting access across a context barrier on a small footprint device using an entry point object
US6907608B1 (en)1999-01-222005-06-14Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using global data structures
US20050102679A1 (en)1999-01-222005-05-12Sun Microsystems, Inc.Techniques for permitting access across a context barrier in a small footprint device using global data structures
US20050091659A1 (en)1999-01-222005-04-28Sun Microsystems, Inc.Techniques for implementing security on a small footprint device using a context barrier
US6823520B1 (en)1999-01-222004-11-23Sun Microsystems, Inc.Techniques for implementing security on a small footprint device using a context barrier
US6402028B1 (en)1999-04-062002-06-11Visa International Service AssociationIntegrated production of smart cards
US20020068554A1 (en)1999-04-092002-06-06Steve DusseMethod and system facilitating web based provisioning of two-way mobile communications devices
US6647260B2 (en)1999-04-092003-11-11Openwave Systems Inc.Method and system facilitating web based provisioning of two-way mobile communications devices
US6609113B1 (en)1999-05-032003-08-19The Chase Manhattan BankMethod and system for processing internet payments using the electronic funds transfer network
DE19925389A1 (en)1999-06-022000-12-21Beta Res GmbhTransferring data onto smart cards involves transmitting encrypted data to card, decrypting in card using different keys, encrypting and decrypting data on basis of specific information in smart card
US6792536B1 (en)1999-10-202004-09-14Timecertain LlcSmart card system and methods for proving dates in digital files
US6963270B1 (en)1999-10-272005-11-08Checkpoint Systems, Inc.Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system
US8150767B2 (en)2000-02-162012-04-03Mastercard International IncorporatedSystem and method for conducting electronic commerce with a remote wallet server
US20010027441A1 (en)2000-02-162001-10-04Mastercard International Incorporated.System and method for conducting electronic commerce with a remote wallet server
US20010021927A1 (en)2000-03-072001-09-13Christophe LaurentElectronic wallet system
US7206769B2 (en)2000-03-072007-04-17Thomson LicensingElectronic wallet system
US20020194138A1 (en)2000-04-242002-12-19Visa International Service Association A Delaware CorporationOnline account authentication service
US20010039657A1 (en)2000-04-282001-11-08Tvmentor, Inc.Methods, systems and devices for selectively presenting and sorting data content
US20020042776A1 (en)2000-09-192002-04-11Woo Kevin K.M.System and method for unifying electronic payment mechanisms
US20040030601A1 (en)2000-09-292004-02-12Pond Russell L.Electronic payment methods for a mobile device
US20050001711A1 (en)*2000-11-062005-01-06Innovation Connection CorporationSystem, method and apparatus for electronic ticketing
US7346170B2 (en)2000-12-262008-03-18Sony CorporationInformation processing system and method
US20030074579A1 (en)2001-10-162003-04-17Microsoft CorporationVirtual distributed security system
US7243853B1 (en)2001-12-042007-07-17Visa U.S.A. Inc.Method and system for facilitating memory and application management on a secured token
EP1318488A2 (en)2001-12-062003-06-11Matsushita Electric Industrial Co., Ltd.IC card with capability of having plurality of card managers installed
US7159180B2 (en)2001-12-142007-01-02America Online, Inc.Proxy platform integration system
US20040029569A1 (en)2001-12-262004-02-12Vivotech, Inc.Micropayment financial transaction process utilizing wireless network processing
US20100250956A1 (en)2002-10-072010-09-30Visa International Service AssociationMethod and system for facilitating data access and management on a secure token
US20070135164A1 (en)2002-12-072007-06-14Healthpia Co., Ltd.Mobile communication terminal having ic card settlement function
US20040140351A1 (en)2002-12-112004-07-22Scheidt & Bachmann GmbhMethods and systems for user media interoperability
US20040123152A1 (en)2002-12-182004-06-24Eric Le SaintUniform framework for security tokens
US20040128259A1 (en)2002-12-312004-07-01Blakeley Douglas BurnetteMethod for ensuring privacy in electronic transactions with session key blocks
US7392378B1 (en)2003-03-192008-06-24Verizon Corporate Services Group Inc.Method and apparatus for routing data traffic in a cryptographically-protected network
US7382762B2 (en)2003-07-082008-06-03Samsung Electronics Co., Ltd.Method and system for distributed certificate management in ad-hoc networks
US7152782B2 (en)2003-07-112006-12-26Visa International Service AssociationSystem and method for managing electronic data transfer applications
US20050071418A1 (en)2003-09-172005-03-31Openwave Systems Inc.Federated download of digital content to wireless devices
US20080162834A1 (en)2003-09-252008-07-03Daniel Alan BrokenshireTask Queue Management of Virtual Devices Using a Plurality of Processors
US20050149926A1 (en)2003-12-222005-07-07Sun Microsystems, Inc.Framework for providing a configurable firewall for computing systems
US7360691B2 (en)2004-02-022008-04-22Matsushita Electric Industrial Co., Ltd.Secure device and mobile terminal which carry out data exchange between card applications
US7374099B2 (en)2004-02-242008-05-20Sun Microsystems, Inc.Method and apparatus for processing an application identifier from a smart card
US7191288B2 (en)2004-02-242007-03-13Sun Microsystems, Inc.Method and apparatus for providing an application on a smart card
US20050184164A1 (en)2004-02-242005-08-25Sun Microsystems, Inc. A Delaware CorporationMethod and apparatus for installing an application onto a smart card
US20050184165A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and appatatus for selecting a desired application on a smart card
US7165727B2 (en)2004-02-242007-01-23Sun Microsystems, Inc.Method and apparatus for installing an application onto a smart card
US20050188360A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for providing an application on a smart card
US20050184163A1 (en)2004-02-242005-08-25Sun Microsystems, Inc., A Delaware CorporationMethod and apparatus for processing an application identifier from a smart card
US7140549B2 (en)2004-02-242006-11-28Sun Microsystems, Inc.Method and apparatus for selecting a desired application on a smart card
US20050222961A1 (en)2004-04-052005-10-06Philippe StaibSystem and method of facilitating contactless payment transactions across different payment systems using a common mobile device acting as a stored value device
US20070090195A1 (en)2004-04-082007-04-26Hiromi KawamuraSemiconductor memory
US7275685B2 (en)2004-04-122007-10-02Rearden Capital CorporationMethod for electronic payment
US20060036570A1 (en)2004-08-032006-02-16Softricity, Inc.System and method for controlling inter-application association through contextual policy control
US20060041507A1 (en)2004-08-132006-02-23Sbc Knowledge Ventures L.P.Pluggable authentication for transaction tool management services
US7860486B2 (en)2004-10-222010-12-28Broadcom CorporationKey revocation in a mobile device
US20060126831A1 (en)2004-12-142006-06-15Cerruti Julian ASystems, methods, and media for adding an additional level of indirection to title key encryption
US7232073B1 (en)2004-12-212007-06-19Sun Microsystems, Inc.Smart card with multiple applications
US7502946B2 (en)2005-01-202009-03-10Panasonic CorporationUsing hardware to secure areas of long term storage in CE devices
US20060165060A1 (en)2005-01-212006-07-27Robin DuaMethod and apparatus for managing credentials through a wireless network
US20080270253A1 (en)2005-02-142008-10-30Smarttrust AbMethod for Performing an Electronic Transaction
US20070067325A1 (en)*2005-02-142007-03-22Xsapio, Ltd.Methods and apparatus to load and run software programs in data collection devices
US20060219774A1 (en)2005-03-302006-10-05Benco David SNetwork support for credit card receipt reconciliation
US7631346B2 (en)2005-04-012009-12-08International Business Machines CorporationMethod and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment
US7650505B1 (en)2005-06-172010-01-19Sun Microsystems, Inc.Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies
US20070169043A1 (en)2006-01-092007-07-19Sun Microsystems, Inc.Supporting applets on a high end platform
US7739731B2 (en)2006-01-092010-06-15Oracle America, Inc.Method and apparatus for protection domain based security
US20070226786A1 (en)2006-03-212007-09-27International Business Machines CorporationMethod and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
US20080130902A1 (en)2006-04-102008-06-05Honeywell International Inc.Secure wireless instrumentation network system
US7958544B2 (en)2006-07-212011-06-07Google Inc.Device authentication
US7469151B2 (en)2006-09-012008-12-23Vivotech, Inc.Methods, systems and computer program products for over the air (OTA) provisioning of soft cards on devices with wireless communications capabilities
US20080056501A1 (en)2006-09-062008-03-06Sslnext Inc.Method and system for providing authentication service for Internet users
US20080073426A1 (en)2006-09-242008-03-27Rfcyber Corp.Method and apparatus for providing electronic purse
US20120129452A1 (en)2006-09-242012-05-24Rfcyber Corp.Method and apparatus for provisioning applications in mobile devices
US20080208681A1 (en)2006-09-282008-08-28Ayman HammadPayment using a mobile device
US20090239512A1 (en)2006-12-042009-09-24Ayman HammadMobile phone containing contactless payment card used in transit fare collection
US20090312011A1 (en)2006-12-152009-12-17Innovision Research & Technology PlcCommunications devices comprising near field rf communicators
US7631810B2 (en)2006-12-192009-12-15Vivotech, Inc.Systems, methods, and computer program products for supporting multiple applications and multiple instances of the same application on a wireless smart device
US20080167988A1 (en)2007-01-052008-07-10Macronix International Co., Ltd.System and Method of Managing Contactless Payment Transactions Using a Mobile Communication Device As A Stored Value Device
US20100012732A1 (en)2007-01-242010-01-21Giesecke & Devrient GmbhInstalling a patch in a smart card module
US20100050271A1 (en)2007-01-312010-02-25Nokia CorporationManaging applications related to secure modules
US20080208762A1 (en)2007-02-222008-08-28First Data CorporationPayments using a mobile commerce device
US20100291896A1 (en)2007-07-242010-11-18Nxp B.V.Method, system and trusted service manager for securely transmitting an application to a mobile phone
US20100330958A1 (en)2007-08-012010-12-30Nxp B.V.Mobile communication device and method for disabling applications
US20100205432A1 (en)2007-09-272010-08-12Nxp B.V.Method, system, trusted service manager, service provider and memory element for managing access rights for trusted applications
EP2043060A1 (en)2007-09-272009-04-01Nxp B.V.Trusted service manager managing reports of lost or stolen mobile communication devices
GB2457221A (en)2007-10-172009-08-12Vodafone PlcSmart Card Web Server (SCWS) administration within a plurality of security domains
US20100323681A1 (en)2007-11-062010-12-23Gemalto S/ASharing or reselling nfc applications among mobile communication devices
US8126806B1 (en)2007-12-032012-02-28Sprint Communications Company L.P.Method for launching an electronic wallet
US20090158028A1 (en)2007-12-172009-06-18Electronics And Telecommunications Research InstituteDrm method and drm system using trusted platform module
US20100203870A1 (en)2008-01-042010-08-12Logomotion, S.R.O.Systems and methods for contactless payment authorization
US20110072425A1 (en)2008-01-162011-03-24Gemalto SaMethod for installing and managing nfc applications with pictures
US20110016275A1 (en)2008-03-042011-01-20Nxp B.V.Mobile communication device and method for implementing mifare memory multiple sectors mechanisms
US20110029671A1 (en)2008-04-102011-02-03Jean-Francois DeprunTerminal and method for managing secure devices
US20090261172A1 (en)2008-04-182009-10-22Pradeep KumarSystems, methods, and computer program products for supporting multiple contactless applications using different security keys
US7967215B2 (en)2008-04-182011-06-28Vivotech Inc.Systems, methods, and computer program products for supporting multiple contactless applications using different security keys
US20110053504A1 (en)2008-05-192011-03-03Nxp B.V.Nfc mobile communication device and nfc reader
US20090307142A1 (en)2008-06-062009-12-10Upendra MardikarTrusted service manager (tsm) architectures and methods
US20110113473A1 (en)2008-06-242011-05-12Nxp B.V.Method of accessing applications in a secure mobile environment
US20100131413A1 (en)2008-08-062010-05-27Kranzley Arthur DMethods and systems to securely loard / reload a contactless payment device
US20100042824A1 (en)2008-08-142010-02-18The Trustees Of Princeton UniversityHardware trust anchors in sp-enabled processors
US20100058463A1 (en)2008-08-282010-03-04Oberthur TechnologiesMethod of exchanging data between two electronic entities
US20100063893A1 (en)2008-09-112010-03-11Palm, Inc.Method of and system for secure on-line purchases
US20100211507A1 (en)2008-09-222010-08-19Christian AabyeOver the air update of payment transaction data stored in secure memory
US20100088237A1 (en)2008-10-042010-04-08Wankmueller John RMethods and systems for using physical payment cards in secure e-commerce transactions
US20100114731A1 (en)2008-10-302010-05-06Kingston Tamara SELECTRONIC WALLET ("eWallet")
US20100138518A1 (en)2008-11-242010-06-03MfoundryMethod and system for downloading information into a secure element of an electronic device
US20100207742A1 (en)2009-01-262010-08-19Motorola, Inc.Wireless Communication Device for Providing at Least One Near Field Communication Service
US20120009873A1 (en)2009-03-102012-01-12Nxp B.V.Method for transmitting an nfc application and computer device
US20100291904A1 (en)2009-05-132010-11-18First Data CorporationSystems and methods for providing trusted service management services
US20100306076A1 (en)2009-05-292010-12-02Ebay Inc.Trusted Integrity Manager (TIM)
US20100306107A1 (en)2009-05-292010-12-02Ebay Inc.Trusted remote attestation agent (traa)
US20100306531A1 (en)2009-05-292010-12-02Ebay Inc.Hardware-Based Zero-Knowledge Strong Authentication (H0KSA)
US20110078081A1 (en)2009-09-302011-03-31Kiushan PirzadehMobile payment application architecture
US20110087610A1 (en)2009-10-132011-04-14Asif BatadaGlobal secure service provider directory
US8312284B1 (en)2009-11-062012-11-13Google Inc.Verifiable timestamping of data objects, and applications thereof
US20110131421A1 (en)2009-12-022011-06-02Fabrice Jogand-CoulombMethod for installing an application on a sim card
US20110320291A1 (en)2010-06-282011-12-29Coon Jonathan CSystems and methods for asynchronous mobile authorization of credit card purchases
US8335921B2 (en)2010-12-172012-12-18Google, Inc.Writing application data to a secure element
US8352749B2 (en)2010-12-172013-01-08Google Inc.Local trusted services manager for a contactless smart card
US8335932B2 (en)2010-12-172012-12-18Google Inc.Local trusted services manager for a contactless smart card
US8255687B1 (en)2011-09-152012-08-28Google Inc.Enabling users to select between secure service providers using a key escrow service
US8379863B1 (en)2011-09-152013-02-19Google Inc.Enabling users to select between secure service providers using a central trusted service manager
US8313036B1 (en)2011-09-162012-11-20Google Inc.Secure application directory
US8297520B1 (en)2011-09-162012-10-30Google Inc.Secure application directory
US8385553B1 (en)2012-02-282013-02-26Google Inc.Portable secure element

Non-Patent Citations (38)

* Cited by examiner, † Cited by third party
Title
"EPC-GSMA Trusted Service Manager Service Management Requirements and Specifications", retrieved from http://www.europeanpaymentscouncil.eu/documents/EPC220-08%20EPC%20GSMA%20TSM%20WP%20V1.pdf, Jan. 2010.
"Global Platform: Contacless Services, Card Specification v2.2," Version 1.0, Feb. 2010, GlobalPlatform Inc.
AN1787-MIFARE Application Directory (MAD), NXP Semiconductors-MIFARE Application Directory, pp. 1-23, Jul. 7, 2010.
Boly, J.P. et al., "The ESPIRIT Project CAFE-High Security Digital Payment Systems," ESCORIC 94 (Third European Symposium on Research in Computer Security), LNCS 875, 1994, pp. 217-230, Springer-Verlag, Berlin.
Chen, Z., "How to Write a Java Card Applet: A Developer's Guide," JavaWorld.com, Jul. 1, 1999.
Corum, C., Editor, "Santa Clara Puts Payments in 'Palm' of Your Hand: Palms and Cellphones Initiate Payments to Campus Card System," CR80News.com, May 2003, vol. 2, No. 5.
Daswani, N. et al., "SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations," Proceedings of the 3rd USENIX Workshop on Electronic Commerce, Aug. 31 -Sep. 3 1998.
Data Sheet: MIFARE-Standard Card IC-MF1 IC S50 Functional Specification, Philips Semiconductors-Product Specification-Revision 4.0, Sep. 1-18, Jul. 1, 1998.
Dotzer, F., "Aspects of Multi-Application Smart Card Management Systems," Thesis at the Lehrstuhl fur Dateoverarbeitung (LDV) (Institute of Data Processing), Munchen Technical University, Oct. 15, 2002.
Final Office Action issued in U.S. Appl. No. 13/244,824, dated Jun. 1, 2012, pp. 1-32.
Hernandez, R., "E-Wallet Software Architecture and Decentralized Credentials," Norsk Informatikkonferancse (NIK), 2003.
Hernandez, R., "E-Wallet with Decentralized Credential Keepers," Master Thesis for lnstitutt for Telematikk, Jun. 30, 2003.
Huang, P. et al., Future Personal 'E-Payment': IrFM, IEEE Wireless Communications, Feb. 2006.
Huang, T., Office Action issued in copending U.S. Appl. No. 13/360,618, filed Jan. 27, 2012.
Mjolsnes, S., "On-Line E-Wallet System with Decentralized Credential Keepers," Mobile Networks and Applications 8, 87-99, 2003, Kluwer Academic Publishers.
Notice of Allowance issued in U.S. Appl. No. 13/244,775, Jun. 1, 2012.
Notice of Allowance issued in U.S. Appl. No. 13/244,806, dated Apr. 11, 2012.
Office Action issued in U.S. Appl. No. 13/244,756, dated Jan. 5, 2012.
Office Action issued in U.S. Appl. No. 13/244,775, dated Dec. 28, 2011.
Office Action issued in U.S. Appl. No. 13/244,806, dated Dec. 23, 2011.
Office Action issued in U.S. Appl. No. 13/244,824, dated Dec. 21, 2011.
Runtime Environment Specification-Java Card Platform, Version 3.0, Classic Edition, Sun Microsystems, Inc. pp. 1-158, Mar. 1, 2008.
The Role of the TSM (p. 7) Gemalto-The Review, pp. 7; (entire publ: 1, Jan. 1, 2008.
The Smart Card Alliance, "Mobile Payments at the Physical Point-of-Sale: Assessing U.S. Market Drivers and Industry Direction", Pub. No. PT-05001, Apr. 2005.
U.S. Appl. No. 13/360,618 to von Behren et al., filed Jan. 27, 2012.
U.S. Appl. No. 13/547,029 to Wall et al., filed Jul. 11, 2012.
U.S. Appl. No. 13/589,067 to Pelly et al., filed Aug. 17, 2012.
U.S. Appl. No. 13/618,166 to Wakerly et al., filed Sep. 14, 2012.
U.S. Appl. No. 13/686,887 to von Behren et al., filed Nov. 27, 2012.
U.S. Appl. No. 13/717,686 to von Behren et al., filed Dec. 17, 2012,
U.S. Appl. No. 13/752,355 to Pelly et al., filed Jan. 28, 2013.
U.S. Appl. No. 13/776,660 to Jooste et al., filed Feb. 25, 2013.
U.S. Appl. No. 60/338,419, filed Dec. 4, 2001, Merckling et al.
Yin, Sara, Google Wallet Is Just Another Pilot, Says World's Largest SIM Card Maker PCMag.com, pp. 1, May 27, 2011.
Yin, Sara: Google Wallet Aims to Take Mobile Payments Mainstream, PCMag.com, pp. 1-2, May 26, 2011.
Yixin et al. Design of Objects Sharing Mechanisms with Security Domain in Java, 2009 International Conference on Electronic Cumputer Technology, pp. 1-5, Feb. 20, 2009.
Yliuntinen, 3rd Party TSM Managemetn of SIM Cards Cryptomathic, pp. 1-5, Sep. 1, 2011.
Yun, S. et al., "Design and Implementation of Wireless Payment System Using GVM and MobileC," Proceedings of the International Conference on Mobile Computing and Ubiquitous Networking, 2005, pp. 1-10, vol. 1.

Cited By (344)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11605074B2 (en)2005-09-062023-03-14Visa U.S.A. Inc.System and method for secured account numbers in proximily devices
US10922686B2 (en)2005-09-062021-02-16Visa U.S.A. Inc.System and method for secured account numbers in proximity devices
US12045812B2 (en)2005-09-062024-07-23Visa U.S.A. Inc.System and method for secured account numbers in wireless devices
US10289999B2 (en)2005-09-062019-05-14Visa U.S.A. Inc.System and method for secured account numbers in proximity devices
US20150278800A1 (en)*2006-09-242015-10-01Rfcyber CorporationMethod and apparatus for mobile payments
US20140006194A1 (en)*2006-09-242014-01-02Rfcyber CorporationMethod and apparatus for settling payments using mobile devices
US11018724B2 (en)*2006-09-242021-05-25Rfcyber Corp.Method and apparatus for emulating multiple cards in mobile devices
US11004061B2 (en)*2006-09-242021-05-11Rfcyber CorporationMethod and apparatus for payments between two mobile devices
US10600046B2 (en)*2006-09-242020-03-24Rfcyber CorporationMethod and apparatus for mobile payments
US9047601B2 (en)*2006-09-242015-06-02RFCyber CorprationMethod and apparatus for settling payments using mobile devices
US20210264405A1 (en)*2006-09-242021-08-26Rfcyber CorpMethod and apparatus for payments between two mobile devices
US10726416B2 (en)2007-06-252020-07-28Visa International Service AssociationSecure mobile payment system
US10043178B2 (en)2007-06-252018-08-07Visa International Service AssociationSecure mobile payment system
US10262308B2 (en)2007-06-252019-04-16Visa U.S.A. Inc.Cardless challenge systems and methods
US11481742B2 (en)2007-06-252022-10-25Visa U.S.A. Inc.Cardless challenge systems and methods
US10733604B2 (en)2007-09-132020-08-04Visa U.S.A. Inc.Account permanence
US9530131B2 (en)2008-07-292016-12-27Visa U.S.A. Inc.Transaction processing using a global unique identifier
US9898740B2 (en)2008-11-062018-02-20Visa International Service AssociationOnline challenge-response
US9715681B2 (en)2009-04-282017-07-25Visa International Service AssociationVerification of portable consumer devices
US10997573B2 (en)2009-04-282021-05-04Visa International Service AssociationVerification of portable consumer devices
US10572864B2 (en)2009-04-282020-02-25Visa International Service AssociationVerification of portable consumer devices
US12086787B2 (en)2009-05-152024-09-10Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US8827154B2 (en)2009-05-152014-09-09Visa International Service AssociationVerification of portable consumer devices
US9038886B2 (en)2009-05-152015-05-26Visa International Service AssociationVerification of portable consumer devices
US10049360B2 (en)2009-05-152018-08-14Visa International Service AssociationSecure communication of payment information to merchants using a verification token
US9372971B2 (en)2009-05-152016-06-21Visa International Service AssociationIntegration of verification tokens with portable computing devices
US10009177B2 (en)2009-05-152018-06-26Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US9904919B2 (en)2009-05-152018-02-27Visa International Service AssociationVerification of portable consumer devices
US9317848B2 (en)2009-05-152016-04-19Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US9792611B2 (en)2009-05-152017-10-17Visa International Service AssociationSecure authentication system and method
US20100293382A1 (en)*2009-05-152010-11-18Ayman HammadVerification of portable consumer devices
US11574312B2 (en)2009-05-152023-02-07Visa International Service AssociationSecure authentication system and method
US9582801B2 (en)2009-05-152017-02-28Visa International Service AssociationSecure communication of payment information to merchants using a verification token
US10387871B2 (en)2009-05-152019-08-20Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US10043186B2 (en)2009-05-152018-08-07Visa International Service AssociationSecure authentication system and method
US10846683B2 (en)2009-05-152020-11-24Visa International Service AssociationIntegration of verification tokens with mobile communication devices
US11004043B2 (en)2009-05-202021-05-11Visa International Service AssociationDevice including encrypted data for expiration date and verification value creation
US11941591B2 (en)2009-05-202024-03-26Visa International Service AssociationDevice including encrypted data for expiration date and verification value creation
US20170024709A1 (en)*2009-08-112017-01-26Felica Networks, Inc.Information processing apparatus, program, and information processing system
US10255591B2 (en)2009-12-182019-04-09Visa International Service AssociationPayment channel returning limited use proxy dynamic value
US10586229B2 (en)2010-01-122020-03-10Visa International Service AssociationAnytime validation tokens
US9430210B2 (en)*2010-01-222016-08-30Huawei Device Co., Ltd.Method and apparatus for integrating java software into mobile terminal, and mobile terminal
US20120278798A1 (en)*2010-01-222012-11-01Gan QiangMethod and apparatus for integrating java software into mobile terminal, and mobile terminal
US9424413B2 (en)2010-02-242016-08-23Visa International Service AssociationIntegration of payment capability into secure elements of computers
US9589268B2 (en)2010-02-242017-03-07Visa International Service AssociationIntegration of payment capability into secure elements of computers
US10657528B2 (en)2010-02-242020-05-19Visa International Service AssociationIntegration of payment capability into secure elements of computers
US10255601B2 (en)2010-02-252019-04-09Visa International Service AssociationMultifactor authentication using a directory server
US11900343B2 (en)2010-03-032024-02-13Visa International Service AssociationPortable account number for consumer payment account
US10373133B2 (en)2010-03-032019-08-06Visa International Service AssociationPortable account number for consumer payment account
US11847645B2 (en)2010-08-122023-12-19Visa International Service AssociationSecuring external systems with account token substitution
US11803846B2 (en)2010-08-122023-10-31Visa International Service AssociationSecuring external systems with account token substitution
US10726413B2 (en)2010-08-122020-07-28Visa International Service AssociationSecuring external systems with account token substitution
US12361405B2 (en)2010-12-172025-07-15Google LlcDigital wallet
US9691055B2 (en)2010-12-172017-06-27Google Inc.Digital wallet
US11507944B2 (en)2010-12-172022-11-22Google LlcDigital wallet
US9355391B2 (en)2010-12-172016-05-31Google Inc.Digital wallet
US10586227B2 (en)2011-02-162020-03-10Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US11288661B2 (en)2011-02-162022-03-29Visa International Service AssociationSnap mobile payment apparatuses, methods and systems
US11727392B2 (en)2011-02-222023-08-15Visa International Service AssociationMulti-purpose virtual card transaction apparatuses, methods and systems
US11023886B2 (en)2011-02-222021-06-01Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US10223691B2 (en)2011-02-222019-03-05Visa International Service AssociationUniversal electronic payment apparatuses, methods and systems
US10552828B2 (en)2011-04-112020-02-04Visa International Service AssociationMultiple tokenization for authentication
US9280765B2 (en)2011-04-112016-03-08Visa International Service AssociationMultiple tokenization for authentication
US11900359B2 (en)2011-07-052024-02-13Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10154084B2 (en)2011-07-052018-12-11Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US10121129B2 (en)2011-07-052018-11-06Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10803449B2 (en)2011-07-052020-10-13Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10419529B2 (en)2011-07-052019-09-17Visa International Service AssociationHybrid applications utilizing distributed models and views apparatuses, methods and systems
US11010753B2 (en)2011-07-052021-05-18Visa International Service AssociationElectronic wallet checkout platform apparatuses, methods and systems
US10839374B2 (en)2011-07-292020-11-17Visa International Service AssociationPassing payment tokens through an HOP / SOP
US9704155B2 (en)2011-07-292017-07-11Visa International Service AssociationPassing payment tokens through an hop/sop
US9959531B2 (en)2011-08-182018-05-01Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11803825B2 (en)2011-08-182023-10-31Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10825001B2 (en)2011-08-182020-11-03Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US12277537B2 (en)2011-08-182025-04-15Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US11037138B2 (en)2011-08-182021-06-15Visa International Service AssociationThird-party value added wallet features and interfaces apparatuses, methods, and systems
US11010756B2 (en)2011-08-182021-05-18Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US10242358B2 (en)2011-08-182019-03-26Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US11763294B2 (en)2011-08-182023-09-19Visa International Service AssociationRemote decoupled application persistent state apparatuses, methods and systems
US11397931B2 (en)2011-08-182022-07-26Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10354240B2 (en)2011-08-182019-07-16Visa International Service AssociationMulti-directional wallet connector apparatuses, methods and systems
US10078832B2 (en)2011-08-242018-09-18Visa International Service AssociationMethod for using barcodes and mobile devices to conduct payment transactions
US10402815B2 (en)2011-08-242019-09-03Visa International Service AssociationMethod for using barcodes and mobile devices to conduct payment transactions
US11354723B2 (en)2011-09-232022-06-07Visa International Service AssociationSmart shopping cart with E-wallet store injection search
US10223730B2 (en)2011-09-232019-03-05Visa International Service AssociationE-wallet store injection search apparatuses, methods and systems
US11276058B2 (en)2012-01-052022-03-15Visa International Service AssociationData protection with translation
US10147089B2 (en)2012-01-052018-12-04Visa International Service AssociationData protection with translation
US10685379B2 (en)2012-01-052020-06-16Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US11119791B2 (en)2012-01-172021-09-14Sony CorporationInformation processing apparatus, IC chip, information processing method, program, and information processing system
US10599448B2 (en)*2012-01-172020-03-24Sony CorporationInformation processing apparatus, IC chip, information processing method, and information processing system
US9830595B2 (en)2012-01-262017-11-28Visa International Service AssociationSystem and method of providing tokenization as a service
US10607217B2 (en)2012-01-262020-03-31Visa International Service AssociationSystem and method of providing tokenization as a service
US10262001B2 (en)2012-02-022019-04-16Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US11036681B2 (en)2012-02-022021-06-15Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia analytical model sharing database platform apparatuses, methods and systems
US10430381B2 (en)2012-02-022019-10-01Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US11074218B2 (en)2012-02-022021-07-27Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia merchant analytics database platform apparatuses, methods and systems
US10983960B2 (en)2012-02-022021-04-20Visa International Service AssociationMulti-source, multi-dimensional, cross-entity, multimedia centralized personal information database platform apparatuses, methods and systems
US11995633B2 (en)2012-03-062024-05-28Visa International Service AssociationSecurity system incorporating mobile device
US10282724B2 (en)2012-03-062019-05-07Visa International Service AssociationSecurity system incorporating mobile device
US10937031B2 (en)2012-05-042021-03-02Visa International Service AssociationSystem and method for local data conversion
US11037140B2 (en)2012-06-062021-06-15Visa International Service AssociationMethod and system for correlating diverse transaction data
US9524501B2 (en)2012-06-062016-12-20Visa International Service AssociationMethod and system for correlating diverse transaction data
US10296904B2 (en)2012-06-062019-05-21Visa International Service AssociationMethod and system for correlating diverse transaction data
US9547769B2 (en)2012-07-032017-01-17Visa International Service AssociationData protection hub
US9846861B2 (en)2012-07-252017-12-19Visa International Service AssociationUpstream and downstream data conversion
US9727858B2 (en)2012-07-262017-08-08Visa U.S.A. Inc.Configurable payment tokens
US9256871B2 (en)2012-07-262016-02-09Visa U.S.A. Inc.Configurable payment tokens
US10204227B2 (en)2012-08-102019-02-12Visa International Service AssociationPrivacy firewall
US10586054B2 (en)2012-08-102020-03-10Visa International Service AssociationPrivacy firewall
US9665722B2 (en)2012-08-102017-05-30Visa International Service AssociationPrivacy firewall
US11715097B2 (en)2012-09-112023-08-01Visa International Service AssociationCloud-based virtual wallet NFC apparatuses, methods and systems
US10192216B2 (en)2012-09-112019-01-29Visa International Service AssociationCloud-based virtual wallet NFC apparatuses, methods and systems
US10853797B2 (en)2012-09-112020-12-01Visa International Service AssociationCloud-based virtual wallet NFC apparatuses, methods and systems
US10614460B2 (en)2012-10-232020-04-07Visa International Service AssociationTransaction initiation determination system utilizing transaction data elements
US10176478B2 (en)2012-10-232019-01-08Visa International Service AssociationTransaction initiation determination system utilizing transaction data elements
US10692076B2 (en)2012-11-212020-06-23Visa International Service AssociationDevice pairing via trusted intermediary
US9911118B2 (en)2012-11-212018-03-06Visa International Service AssociationDevice pairing via trusted intermediary
US10304047B2 (en)2012-12-072019-05-28Visa International Service AssociationToken generating component
US20140189880A1 (en)*2012-12-312014-07-03Gemalto SaSystem and method for administrating access control rules on a secure element
US10740731B2 (en)2013-01-022020-08-11Visa International Service AssociationThird party settlement
US9741051B2 (en)2013-01-022017-08-22Visa International Service AssociationTokenization and third-party interaction
US10223710B2 (en)2013-01-042019-03-05Visa International Service AssociationWearable intelligent vision device apparatuses, methods and systems
US9947001B2 (en)*2013-03-152018-04-17Mastercard International IncorporatedSystem and method for using multiple payment accounts using a single payment device
US20140279559A1 (en)*2013-03-152014-09-18Mastercard International IncorporatedSystem and method for using multiple payment accounts using a single payment device
JP2016514328A (en)*2013-03-152016-05-19マスターカード インターナショナル インコーポレーテッド Method and system for using multiple payment accounts using one payment device
US9495558B2 (en)*2013-03-262016-11-15Google Inc.Systems, methods, and computer program products for managing access control
US20140298484A1 (en)*2013-03-262014-10-02Jvl Ventures LlcSystems, methods, and computer program products for managing access control
US11055710B2 (en)2013-05-022021-07-06Visa International Service AssociationSystems and methods for verifying and processing transactions using virtual currency
US9978062B2 (en)2013-05-152018-05-22Visa International Service AssociationMobile tokenization hub
US11341491B2 (en)2013-05-152022-05-24Visa International Service AssociationMobile tokenization hub using dynamic identity information
US11861607B2 (en)2013-05-152024-01-02Visa International Service AssociationMobile tokenization hub using dynamic identity information
US20140351806A1 (en)*2013-05-212014-11-27Jvl Ventures, LlcSystems, methods, and computer program products for managing service upgrades
US11017402B2 (en)2013-06-172021-05-25Visa International Service AssociationSystem and method using authorization and direct credit messaging
US10878422B2 (en)2013-06-172020-12-29Visa International Service AssociationSystem and method using merchant token
US10607212B2 (en)2013-07-152020-03-31Visa International Services AssociationSecure remote payment transaction processing
US11055694B2 (en)2013-07-152021-07-06Visa International Service AssociationSecure remote payment transaction processing
US12198124B2 (en)2013-07-152025-01-14Visa International Service AssociationSecure remote payment transaction processing
US11093936B2 (en)2013-07-242021-08-17Visa International Service AssociationSystems and methods for communicating token attributes associated with a token vault
US12400223B2 (en)2013-07-242025-08-26Visa International Service AssociationSystems and methods for communicating risk using token assurance data
US9996835B2 (en)2013-07-242018-06-12Visa International Service AssociationSystems and methods for communicating token attributes associated with a token vault
US11915235B2 (en)2013-07-242024-02-27Visa International Service AssociationSystems and methods for communicating token attributes associated with a token vault
US10902421B2 (en)2013-07-262021-01-26Visa International Service AssociationProvisioning payment credentials to a consumer
US10021104B2 (en)*2013-08-072018-07-10Giesecke+Devrient Mobile Security GmbhMethod for operating a security element
US20160191527A1 (en)*2013-08-072016-06-30Giesecke & Devrient GmbhMethod for Operating a Security Element
US20220327527A1 (en)*2013-08-082022-10-13Visa International Service AssociationMethods and systems for provisioning mobile devices with payment credentials
US10496986B2 (en)2013-08-082019-12-03Visa International Service AssociationMulti-network tokenization processing
US11676138B2 (en)2013-08-082023-06-13Visa International Service AssociationMulti-network tokenization processing
US10510073B2 (en)2013-08-082019-12-17Visa International Service AssociationMethods and systems for provisioning mobile devices with payment credentials
US12361409B2 (en)*2013-08-082025-07-15Visa International Service AssociationMethods and systems for provisioning mobile devices with payment credentials
US11392939B2 (en)2013-08-082022-07-19Visa International Service AssociationMethods and systems for provisioning mobile devices with payment credentials
US12333528B2 (en)2013-08-082025-06-17Visa International Service AssociationMulti-network tokenization processing
US11062306B2 (en)2013-08-152021-07-13Visa International Service AssociationSecure remote payment transaction processing using a secure element
US11188901B2 (en)2013-08-152021-11-30Visa International Service AssociationSecure remote payment transaction processing using a secure element
US9646303B2 (en)2013-08-152017-05-09Visa International Service AssociationSecure remote payment transaction processing using a secure element
US11847643B2 (en)2013-08-152023-12-19Visa International Service AssociationSecure remote payment transaction processing using a secure element
US11710120B2 (en)2013-09-202023-07-25Visa International Service AssociationSecure remote payment transaction processing including consumer authentication
US10817875B2 (en)2013-09-202020-10-27Visa International Service AssociationSecure remote payment transaction processing including consumer authentication
US12205110B2 (en)2013-10-112025-01-21Visa International Service AssociationNetwork token system
US10891610B2 (en)2013-10-112021-01-12Visa International Service AssociationNetwork token system
US9978094B2 (en)2013-10-112018-05-22Visa International Service AssociationTokenization revocation list
US11710119B2 (en)2013-10-112023-07-25Visa International Service AssociationNetwork token system
US10515358B2 (en)2013-10-182019-12-24Visa International Service AssociationContextual transaction token methods and systems
US10489779B2 (en)2013-10-212019-11-26Visa International Service AssociationMulti-network token bin routing with defined verification parameters
US10366387B2 (en)2013-10-292019-07-30Visa International Service AssociationDigital wallet system and method
US12026705B2 (en)2013-11-042024-07-02Apple Inc.System and method for payments using biometric authentication
US10248952B2 (en)2013-11-192019-04-02Visa International Service AssociationAutomated account provisioning
US9516487B2 (en)2013-11-192016-12-06Visa International Service AssociationAutomated account provisioning
US10212148B2 (en)2013-12-162019-02-19Mbr Innovations LlcSystems and methods for verifying attributes of users of online systems
US10516658B2 (en)2013-12-162019-12-24Mbr Innovations LlcSystems and methods for verifying attributes of users of online systems
US11164176B2 (en)2013-12-192021-11-02Visa International Service AssociationLimited-use keys and cryptograms
US10402814B2 (en)2013-12-192019-09-03Visa International Service AssociationCloud-based transactions methods and systems
US9922322B2 (en)2013-12-192018-03-20Visa International Service AssociationCloud-based transactions with magnetic secure transmission
US10664824B2 (en)2013-12-192020-05-26Visa International Service AssociationCloud-based transactions methods and systems
US11017386B2 (en)2013-12-192021-05-25Visa International Service AssociationCloud-based transactions with magnetic secure transmission
US9972005B2 (en)2013-12-192018-05-15Visa International Service AssociationCloud-based transactions methods and systems
US10909522B2 (en)2013-12-192021-02-02Visa International Service AssociationCloud-based transactions methods and systems
US11875344B2 (en)2013-12-192024-01-16Visa International Service AssociationCloud-based transactions with magnetic secure transmission
US10433128B2 (en)2014-01-072019-10-01Visa International Service AssociationMethods and systems for provisioning multiple devices
US10062079B2 (en)2014-01-142018-08-28Visa International Service AssociationPayment account identifier system
US9846878B2 (en)2014-01-142017-12-19Visa International Service AssociationPayment account identifier system
US10269018B2 (en)2014-01-142019-04-23Visa International Service AssociationPayment account identifier system
US10026087B2 (en)2014-04-082018-07-17Visa International Service AssociationData passed in an interaction
US11100507B2 (en)2014-04-082021-08-24Visa International Service AssociationData passed in an interaction
US10904002B2 (en)2014-04-232021-01-26Visa International Service AssociationToken security on a communication device
US10404461B2 (en)2014-04-232019-09-03Visa International Service AssociationToken security on a communication device
US9942043B2 (en)2014-04-232018-04-10Visa International Service AssociationToken security on a communication device
US11470164B2 (en)2014-05-012022-10-11Visa International Service AssociationData verification using access device
US9680942B2 (en)2014-05-012017-06-13Visa International Service AssociationData verification using access device
US9848052B2 (en)2014-05-052017-12-19Visa International Service AssociationSystem and method for token domain control
US12294630B2 (en)2014-05-052025-05-06Visa International Service AssociationSystem and method for token domain control
US11122133B2 (en)2014-05-052021-09-14Visa International Service AssociationSystem and method for token domain control
US11842350B2 (en)2014-05-212023-12-12Visa International Service AssociationOffline authentication
US10846694B2 (en)2014-05-212020-11-24Visa International Service AssociationOffline authentication
US11568405B2 (en)2014-06-052023-01-31Visa International Service AssociationIdentification and verification for provisioning mobile application
US12346903B2 (en)2014-06-052025-07-01Visa International Service AssociationIdentification and verification for provisioning mobile application
US11023890B2 (en)2014-06-052021-06-01Visa International Service AssociationIdentification and verification for provisioning mobile application
US10038563B2 (en)2014-07-232018-07-31Visa International Service AssociationSystems and methods for secure detokenization
US10652028B2 (en)2014-07-232020-05-12Visa International Service AssociationSystems and methods for secure detokenization
US9780953B2 (en)2014-07-232017-10-03Visa International Service AssociationSystems and methods for secure detokenization
US11770369B2 (en)2014-07-312023-09-26Visa International Service AssociationSystem and method for identity verification across mobile applications
US10484345B2 (en)2014-07-312019-11-19Visa International Service AssociationSystem and method for identity verification across mobile applications
US11252136B2 (en)2014-07-312022-02-15Visa International Service AssociationSystem and method for identity verification across mobile applications
US10552808B1 (en)2014-08-202020-02-04Square, Inc.Payment via messaging application
US10477393B2 (en)2014-08-222019-11-12Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US11036873B2 (en)2014-08-222021-06-15Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US9775029B2 (en)2014-08-222017-09-26Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US10049353B2 (en)2014-08-222018-08-14Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
US11783061B2 (en)2014-08-222023-10-10Visa International Service AssociationEmbedding cloud-based functionalities in a communication device
RU2647625C2 (en)*2014-09-162018-03-16Сяоми Инк.Application program running method and device
US9870239B2 (en)*2014-09-162018-01-16Xiaomi Inc.Method and device for running application program
US20160077819A1 (en)*2014-09-162016-03-17Xiaomi Inc.Method and device for running application program
US10140615B2 (en)2014-09-222018-11-27Visa International Service AssociationSecure mobile device credential provisioning using risk decision non-overrides
US11087328B2 (en)2014-09-222021-08-10Visa International Service AssociationSecure mobile device credential provisioning using risk decision non-overrides
US11574311B2 (en)2014-09-222023-02-07Visa International Service AssociationSecure mobile device credential provisioning using risk decision non-overrides
US10255456B2 (en)2014-09-262019-04-09Visa International Service AssociationRemote server encrypted data provisioning system and methods
US10643001B2 (en)2014-09-262020-05-05Visa International Service AssociationRemote server encrypted data provisioning system and methods
US11734679B2 (en)2014-09-292023-08-22Visa International Service AssociationTransaction risk based token
US11257074B2 (en)2014-09-292022-02-22Visa International Service AssociationTransaction risk based token
US9992616B2 (en)2014-09-302018-06-05Huawei Technologies Co., Ltd.Information processing method and NFC terminal
US10412060B2 (en)2014-10-222019-09-10Visa International Service AssociationToken enrollment system and method
US10015147B2 (en)2014-10-222018-07-03Visa International Service AssociationToken enrollment system and method
US10769628B2 (en)2014-10-242020-09-08Visa Europe LimitedTransaction messaging
US12051064B2 (en)2014-10-242024-07-30Visa Europe LimitedTransaction messaging
US9883395B2 (en)*2014-11-252018-01-30Google LlcSecurely accessing secure elements
US10990977B2 (en)2014-11-252021-04-27Visa International Service AssociationSystem communications with non-sensitive identifiers
US12002049B2 (en)2014-11-252024-06-04Visa International Service AssociationSystem communications with non-sensitive identifiers
US10325261B2 (en)2014-11-252019-06-18Visa International Service AssociationSystems communications with non-sensitive identifiers
US20160150410A1 (en)*2014-11-252016-05-26Google Inc.Securely Accessing Secure Elements
US12112316B2 (en)2014-11-262024-10-08Visa International Service AssociationTokenization request via access device
US11620643B2 (en)2014-11-262023-04-04Visa International Service AssociationTokenization request via access device
US9858429B2 (en)2014-12-012018-01-02Samsung Electronics Co., Ltd.Methods of data transfer in electronic devices
US10937021B2 (en)2014-12-032021-03-02Trec CorporationProprietary token-based universal payment processing system
US10785212B2 (en)2014-12-122020-09-22Visa International Service AssociationAutomated access data provisioning
US10257185B2 (en)2014-12-122019-04-09Visa International Service AssociationAutomated access data provisioning
US11580519B2 (en)2014-12-122023-02-14Visa International Service AssociationProvisioning platform for machine-to-machine devices
US10187363B2 (en)2014-12-312019-01-22Visa International Service AssociationHybrid integration of software development kit with secure execution environment
US10511583B2 (en)2014-12-312019-12-17Visa International Service AssociationHybrid integration of software development kit with secure execution environment
US11240219B2 (en)2014-12-312022-02-01Visa International Service AssociationHybrid integration of software development kit with secure execution environment
US10496965B2 (en)2015-01-202019-12-03Visa International Service AssociationSecure payment processing using authorization request
US11010734B2 (en)2015-01-202021-05-18Visa International Service AssociationSecure payment processing using authorization request
US10096009B2 (en)2015-01-202018-10-09Visa International Service AssociationSecure payment processing using authorization request
US11704629B2 (en)2015-01-272023-07-18Banma Zhixing Network (Hongkong) Co., LimitedMethods and devices for processing information card
US20160255055A1 (en)*2015-01-292016-09-01Google Inc.Controlling Access To Resource Functions At A Control Point Of The Resource Via A User Device
US9584489B2 (en)*2015-01-292017-02-28Google Inc.Controlling access to resource functions at a control point of the resource via a user device
US11250391B2 (en)2015-01-302022-02-15Visa International Service AssociationToken check offline
US11176554B2 (en)2015-02-032021-11-16Visa International Service AssociationValidation identity tokens for transactions
US11915243B2 (en)2015-02-032024-02-27Visa International Service AssociationValidation identity tokens for transactions
US10977657B2 (en)2015-02-092021-04-13Visa International Service AssociationToken processing utilizing multiple authorizations
US10164996B2 (en)2015-03-122018-12-25Visa International Service AssociationMethods and systems for providing a low value token buffer
US11271921B2 (en)2015-04-102022-03-08Visa International Service AssociationBrowser integration with cryptogram
US10333921B2 (en)2015-04-102019-06-25Visa International Service AssociationBrowser integration with Cryptogram
US12137088B2 (en)2015-04-102024-11-05Visa International Service AssociationBrowser integration with cryptogram
CN104714890A (en)*2015-04-132015-06-17东信和平科技股份有限公司Method and system for detecting intelligent card in cross-platform way
US9998978B2 (en)2015-04-162018-06-12Visa International Service AssociationSystems and methods for processing dormant virtual access devices
US10568016B2 (en)2015-04-162020-02-18Visa International Service AssociationSystems and methods for processing dormant virtual access devices
US10552834B2 (en)2015-04-302020-02-04Visa International Service AssociationTokenization capable authentication framework
US10346848B2 (en)2015-06-072019-07-09Apple Inc.Provisioning multiple secure credentials on an electronic device
US10440056B2 (en)*2015-06-172019-10-08Idemia Identity & SecurityMethod for deploying an application in a secure element
US20170099320A1 (en)*2015-06-172017-04-06MorphoMethod for deploying an application in a secure element
CN105045597A (en)*2015-08-072015-11-11中国联合网络通信集团有限公司JAVA card object calling method and apparatus
CN105045597B (en)*2015-08-072018-03-06中国联合网络通信集团有限公司A kind of JAVA card object reference method and device
US10387685B2 (en)2015-08-072019-08-20China United Network Communications Group Company LimitedMethod and device for invoking java card object
US10853790B2 (en)2015-09-252020-12-01Samsung Electronics Co., Ltd.Method of operating payment device for selectively enabling payment function according to validity of host
US11763289B2 (en)2015-09-252023-09-19Samsung Electronics Co., Ltd.Method of operating payment device for selectively enabling payment function according to validity of host
US12380426B2 (en)2015-09-252025-08-05Samsung Electronics Co., Ltd.Method of operating payment device for selectively enabling payment function according to validity of host
US12314944B2 (en)2015-10-152025-05-27Visa International Service AssociationInstant token issuance
US11068889B2 (en)2015-10-152021-07-20Visa International Service AssociationInstant token issuance
US10664843B2 (en)2015-12-042020-05-26Visa International Service AssociationUnique code for token verification
US11127016B2 (en)2015-12-042021-09-21Visa International Service AssociationUnique code for token verification
US10664844B2 (en)2015-12-042020-05-26Visa International Service AssociationUnique code for token verification
US10911456B2 (en)2016-01-072021-02-02Visa International Service AssociationSystems and methods for device push provisioning
US10243958B2 (en)2016-01-072019-03-26Visa International Service AssociationSystems and methods for device push provisoning
US11010749B2 (en)2016-01-132021-05-18Samsung Electronics Co., LtdPayment processing method and electronic device supporting the same
US11720893B2 (en)2016-02-012023-08-08Visa International Service AssociationSystems and methods for code display and use
US11080696B2 (en)2016-02-012021-08-03Visa International Service AssociationSystems and methods for code display and use
US11900361B2 (en)2016-02-092024-02-13Visa International Service AssociationResource provider account token provisioning and processing
US10313321B2 (en)2016-04-072019-06-04Visa International Service AssociationTokenization of co-network accounts
US11386421B2 (en)2016-04-192022-07-12Visa International Service AssociationSystems and methods for performing push transactions
US11250424B2 (en)2016-05-192022-02-15Visa International Service AssociationSystems and methods for creating subtokens using primary tokens
US11995649B2 (en)2016-05-192024-05-28Visa International Service AssociationSystems and methods for creating subtokens using primary tokens
US11068578B2 (en)2016-06-032021-07-20Visa International Service AssociationSubtoken management system for connected devices
US11068899B2 (en)2016-06-172021-07-20Visa International Service AssociationToken aggregation for multi-party transactions
US11783343B2 (en)2016-06-172023-10-10Visa International Service AssociationToken aggregation for multi-party transactions
US12170730B2 (en)2016-06-242024-12-17Visa International Service AssociationUnique token authentication verification value
US11329822B2 (en)2016-06-242022-05-10Visa International Service AssociationUnique token authentication verification value
US10361856B2 (en)2016-06-242019-07-23Visa International Service AssociationUnique token authentication cryptogram
US11714885B2 (en)2016-07-112023-08-01Visa International Service AssociationEncryption key exchange process using access device
US11238140B2 (en)2016-07-112022-02-01Visa International Service AssociationEncryption key exchange process using access device
US10990967B2 (en)2016-07-192021-04-27Visa International Service AssociationMethod of distributing tokens and managing token relationships
US12067558B2 (en)2016-07-192024-08-20Visa International Service AssociationMethod of distributing tokens and managing token relationships
US10509779B2 (en)2016-09-142019-12-17Visa International Service AssociationSelf-cleaning token vault
US10942918B2 (en)2016-09-142021-03-09Visa International Service AssociationSelf-cleaning token vault
US11799862B2 (en)2016-11-282023-10-24Visa International Service AssociationAccess identifier provisioning to application
US12273346B2 (en)2016-11-282025-04-08Visa International Service AssociationAccess identifier provisioning to application
US11323443B2 (en)2016-11-282022-05-03Visa International Service AssociationAccess identifier provisioning to application
US10956141B2 (en)*2016-12-072021-03-23Samsung Electronics Co., Ltd.Secure element management and electronic device performing same and installation package
US10762495B2 (en)*2016-12-302020-09-01Square, Inc.Third-party access to secure hardware
US10783517B2 (en)2016-12-302020-09-22Square, Inc.Third-party access to secure hardware
US20180189777A1 (en)*2016-12-302018-07-05Square, Inc.Third-party access to secure hardware
US11550644B2 (en)*2017-03-062023-01-10Giesecke+Devrient Mobile Security GmbhCard device having applets and transfer of APDUS to applets
US20210073055A1 (en)*2017-03-062021-03-11Giesecke+Devrient Mobile Security GmbhCard device having applets and transfer of apdus to applets
US11900371B2 (en)2017-03-172024-02-13Visa International Service AssociationReplacing token on a multi-token user device
US10915899B2 (en)2017-03-172021-02-09Visa International Service AssociationReplacing token on a multi-token user device
US11449862B2 (en)2017-05-022022-09-20Visa International Service AssociationSystem and method using interaction token
US10902418B2 (en)2017-05-022021-01-26Visa International Service AssociationSystem and method using interaction token
US12067562B2 (en)2017-05-112024-08-20Visa International Service AssociationSecure remote transaction system using mobile devices
US11494765B2 (en)2017-05-112022-11-08Visa International Service AssociationSecure remote transaction system using mobile devices
US11398910B2 (en)2017-07-142022-07-26Visa International Service AssociationToken provisioning utilizing a secure authentication system
US10491389B2 (en)2017-07-142019-11-26Visa International Service AssociationToken provisioning utilizing a secure authentication system
US20230222477A1 (en)*2017-09-162023-07-13Peter GarrettProximal peer to peer money transfer
US11356257B2 (en)2018-03-072022-06-07Visa International Service AssociationSecure remote token release with online authentication
US12335389B2 (en)2018-03-072025-06-17Visa International Service AssociationSecure remote token release with online authentication
US11743042B2 (en)2018-03-072023-08-29Visa International Service AssociationSecure remote token release with online authentication
US11256789B2 (en)2018-06-182022-02-22Visa International Service AssociationRecurring token transactions
US12008088B2 (en)2018-06-182024-06-11Visa International Service AssociationRecurring token transactions
US12120117B2 (en)2018-08-222024-10-15Visa International Service AssociationMethod and system for token provisioning and processing
US11777934B2 (en)2018-08-222023-10-03Visa International Service AssociationMethod and system for token provisioning and processing
WO2020052753A1 (en)*2018-09-122020-03-19Huawei Technologies Co., Ltd.Intermediary system for faciliting communication between virtual smart cards and a smart card interface
US12069178B2 (en)*2018-10-022024-08-20Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
WO2020072419A1 (en)*2018-10-022020-04-09Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US11232272B2 (en)2018-10-022022-01-25Capital One Services, LlcSystems and methods for contactless card applet communication
US20220247565A1 (en)*2018-10-022022-08-04Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
US12056560B2 (en)2018-10-022024-08-06Capital One Services, LlcSystems and methods for contactless card applet communication
US11699047B2 (en)2018-10-022023-07-11Capital One Services, LlcSystems and methods for contactless card applet communication
US10592710B1 (en)2018-10-022020-03-17Capital One Services, LlcSystems and methods for cryptographic authentication of contactless cards
EP3861511A4 (en)*2018-10-022022-07-20Capital One Services, LLC SYSTEMS AND METHODS FOR CRYPTOGRAPHIC AUTHENTICATION OF CONTACTLESS CARDS
US12388816B2 (en)2018-10-082025-08-12Visa International Service AssociationTechniques for token proximity transactions
US12028337B2 (en)2018-10-082024-07-02Visa International Service AssociationTechniques for token proximity transactions
US11870903B2 (en)2018-11-142024-01-09Visa International Service AssociationCloud token provisioning of multiple tokens
US11469895B2 (en)2018-11-142022-10-11Visa International Service AssociationCloud token provisioning of multiple tokens
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US12061677B2 (en)2018-11-152024-08-13The Research Foundation For The State University Of New YorkSecure processor for detecting and preventing exploits of software vulnerability
US20220004634A1 (en)*2018-11-212022-01-06Samsung Electronics Co., Ltd.Electronic device for providing security-required service through secure element, and method for controlling same electronic device
EP3855335A4 (en)*2018-11-212021-11-24Samsung Electronics Co., Ltd. ELECTRONIC DEVICE FOR PROVIDING A NECESSARY SECURITY SERVICE THROUGH A SECURE ELEMENT AND METHOD FOR CONTROLLING THE ELECTRONIC DEVICE
US12265622B2 (en)*2018-11-212025-04-01Samsung Electronics Co., LtdElectronic device for providing security-required service through secure element, and method for controlling same electronic device
CN113168485A (en)*2018-11-212021-07-23三星电子株式会社 Electronic device for providing requested security service via secure element, and method for controlling the same electronic device
CN113168485B (en)*2018-11-212024-12-24三星电子株式会社 Electronic device for providing request security service through a secure element, and method for controlling the same
US11849042B2 (en)2019-05-172023-12-19Visa International Service AssociationVirtual access credential interaction system and method
US20210406869A1 (en)*2020-06-252021-12-30Mastercard International IncorporatedMethods, systems and computer program products for modifying contactless payment card configurations
EP4123541A4 (en)*2020-12-082023-09-20China Unionpay Co., Ltd.Card management method, user terminal, server, card management system, and storage medium
EP4123540A4 (en)*2020-12-232023-10-04China Unionpay Co., Ltd METHOD FOR ACTIVATING A PAYMENT FUNCTION, TERMINAL DEVICE, SERVER, SYSTEM AND STORAGE MEDIUM
US12243044B2 (en)2020-12-232025-03-04China Unionpay Co., Ltd.Method, terminal device, server, system and storage medium for activating payment functions
US12141800B2 (en)2021-02-122024-11-12Visa International Service AssociationInteraction account tokenization system and method
WO2024187162A1 (en)*2023-03-082024-09-12Entrust CorporationAccount and payment processing platform

Also Published As

Publication numberPublication date
US8196131B1 (en)2012-06-05
US8807440B1 (en)2014-08-19

Similar Documents

PublicationPublication DateTitle
US8646059B1 (en)Wallet application for interacting with a secure element application without a trusted server for authentication
US6481632B2 (en)Delegated management of smart card applications
EP2641162B1 (en)System and method for providing secure data communication permissions to trusted applications on a portable communication device
US10699277B2 (en)Security for mobile payment applications
CA2776438C (en)Mobile payment application architecture
CN104380652B (en)Many publisher's safety element subregion frameworks for NFC enabled devices
JP6046248B2 (en) System, method and computer program product for protecting and managing applications on a secure element
US8391837B2 (en)Method, system and trusted service manager for securely transmitting an application to a mobile phone
US11018724B2 (en)Method and apparatus for emulating multiple cards in mobile devices
FI125071B (en) payment
JP4348190B2 (en) Smart card system
CN114175076A (en) Application selection of digital transaction processing units
CN103268249B (en) Method and device for simulating multiple cards in mobile device
EP2048591B1 (en)Method for communication, communication device and secure processor
RolandApplying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
WO2007119594A1 (en)Secure device and read/write device
US9749303B2 (en)Method for personalizing a secure element, method for enabling a service, secure element and computer program product
Markantonakis et al.An overview of the GlobalPlatform smart card specification
EP4548290A1 (en)Methods and systems for personalizing secure smart objects
Shepherd et al.Isolated Hardware Execution Platforms
JP2007249544A (en) Electronic medium and information terminal including the same
NietoHCE-oriented payments vs. SE-oriented payments. Security Issues
HK1189966B (en)System and method for providing secure data communication permissions to trusted applications on a portable communication device
HK1189966A (en)System and method for providing secure data communication permissions to trusted applications on a portable communication device

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:GOOGLE INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:VON BEHREN, ROB;WALL, JONATHAN;SIGNING DATES FROM 20110826 TO 20110916;REEL/FRAME:027687/0643

ASAssignment

Owner name:GOOGLE INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NXP B.V.;REEL/FRAME:027694/0752

Effective date:20111202

Owner name:NXP B.V., NETHERLANDS

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MEYN, HAUKE;MUEHLBERG, ALEXEJ;REEL/FRAME:027690/0698

Effective date:20110927

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

ASAssignment

Owner name:GOOGLE LLC, CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044129/0001

Effective date:20170929

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:12


[8]ページ先頭

©2009-2025 Movatter.jp